Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine

June 2, 2023October 15, 2025 Securonix

RomCom resurfaces by targeting Ukraine politicians and a U.S.-based healthcare provider aiding Ukrainian refugees, using Trojanized installers hosted on cloned websites. The campaign leverages typosquatted domains and a dedicated C2 network (startleague.net) w…

Read More
Threat Research

“Caffeine” Phishing Service Domains | Cofense

June 2, 2023October 16, 2025 Securonix

An evolving credential phishing campaign targets Microsoft Office 365 credentials, leveraging thousands of URLs hosted on domains registered via a “bulletproof” registrar and protected by Cloudflare services. The activity is linked to the defunct Phishing-as-a…

Read More
Threat Research

Asylum Ambuscade: crimeware or cyberespionage?

June 2, 2023October 16, 2025 Securonix

Asylum Ambuscade is a cybercrime group that also conducts cyberespionage campaigns, targeting SMBs, cryptocurrency traders, and government entities in Europe and Central Asia. The report details the group’s SunSeed, AHKBOT, and NODEBOT toolset, their multi-lan…

Read More
Threat Research

GobRAT malware written in Go language targeting Linux routers – JPCERT/CC Eyes

June 2, 2023October 13, 2025 Securonix

JPCERT/CC reports router infections in Japan using GobRAT, a Go-based RAT that communicates with a TLS C2 server. The attack chain drops GobRAT via a Loader Script, establishes persistence with cron and startup scripts, and employs encryption to hide C2 traffi…

Read More
Threat Research

Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa – Check Point Research

June 2, 2023October 17, 2025 Securonix

Check Point Research uncovered a targeted espionage operation in North Africa leveraging a new modular backdoor named Stealth Soldier, active against Libyan entities with links to a broader Eye on the Nile campaign. The malware exfiltrates data, records screen…

Read More
Threat Research

Qakbot: retool, reinfect, recycle – Lumen

June 1, 2023October 18, 2025 CTI

Qakbot shifted its initial-access and delivery methods in 2023—moving from macro-enabled Office documents to OneNote attachments, Mark-of-the-Web evasion, and HTML smuggling—while hiding command-and-control infrastructure in compromised web servers and residen…

Read More
Threat Research

Securonix Threat Research Knowledge Sharing Series: Detecting MacOS LOOBins Attack Activity Using Security Analytics

June 1, 2023October 13, 2025 Securonix

This article documents how legitimate macOS binaries (LOOBins) such as dscl, osascript/pbpaste, xattr, and curl are abused for discovery, clipboard theft, Gatekeeper bypass, and C2. It provides command examples and detection queries customers can use with EDR/…

Read More
Threat Research

Malware Being Distributed Disguised as a Job Application Letter – ASEC BLOG

June 1, 2023October 15, 2025 Securonix

AhnLab’s ASEC warns that malware disguised as a job application letter is being distributed via malicious URLs that mimic a Korean job-seeking site, delivering a Windows payload. The malware exfiltrates data, performs keylogging, takes screenshots, and persist…

Read More
Threat Research

Ransomware Spotlight: TargetCompany – Security News

June 1, 2023October 16, 2025 Securonix

TargetCompany ransomware demonstrates a multi-stage attack chain, from exploiting a public-facing application to rapid execution, persistence, and data encryption. The operation leverages WMI, PowerShell, registry-based autostart, service abuse, and extensive …

Read More
Threat Research

ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)

June 1, 2023October 15, 2025 Securonix

IBM X-Force assesses that ITG10 is targeting South Korean government, universities, think tanks, and dissidents with RokRAT delivered via LNK-based phishing. The operation uses decoy documents and multi-stage PowerShell payloads to download RokRAT from the clo…

Read More
Threat Research

Do Not Cross The ‘RedLine’ Stealer: Detections and Analysis | Splunk

May 31, 2023October 15, 2025 Securonix

RedLine Stealer is a credential-stealing malware distributed via phishing URLs, malicious Chrome extensions, and loader chains, with campaigns impacting healthcare and manufacturing sectors. Splunk’s Threat Research Team analyzes a RedLine Loader, its defense …

Read More
Threat Research

Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence

May 30, 2023October 16, 2025 Securonix

SentinelLabs tracks a targeted social engineering campaign by the North Korean APT group Kimsuky aimed at North Korea affairs experts to steal Google and NK News/NK News Pro credentials and to deliver ReconShark reconnaissance malware. The operation impersonat…

Read More
Threat Research

MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response

May 30, 2023October 16, 2025 Securonix

MOVEit Transfer suffered a critical vulnerability (CVE-2023-34362) that enables SQL injection with potential admin access, arbitrary code execution, and ransomware deployment. Huntress documents the full attack chain, including a persistent webshell (human2.as…

Read More
Threat Research

Operation Red Deer – Perception Point

May 29, 2023October 16, 2025 Securonix

Operation Red Deer is a targeted Israeli phishing campaign that evolves its attack chain across incidents, leveraging impersonation of Israel Post and HTML smuggling to deliver a malware payload. The actors use AsyncRAT (3LOSH RAT) variants, PowerShell and VBS…

Read More
Threat Research

XeGroup’s attack techniques – Blog | Menlo Security

May 29, 2023October 16, 2025 Securonix

XeGroup is a long-running threat actor whose re-emergence involves opportunistic operations such as credit-card skimming, fake websites, and data sale on the dark web. The group exploits public-facing applications (notably CVE-2019-18935 on IIS), deploys ASPXS…

Read More

Posts pagination

Previous 1 … 404 405 406 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.