Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Cyble – SharpPanda APT Campaign Expands Its Arsenal Targeting G20 Nations

May 27, 2023October 13, 2025 Securonix

Cyble researchers describe SharpPanda, a China-linked APT, expanding its arsenal with undetected loaders and weaponized Office documents to target high-level government officials in G20 nations. The campaign relies on spear-phishing with exploits in Microsoft …

Read More
Threat Research

Investigating BlackSuit Ransomware’s Similarities to Royal

May 27, 2023October 13, 2025 Securonix

BlackSuit ransomware shows striking similarities to Royal ransomware across Linux and Windows variants, including ESXi targets, ransom notes with TOR links, and nearly identical encryption behavior. The analysis also highlights shared and unique command-line a…

Read More
Threat Research

Your Business Data and Machine Learning at Risk: Attacks Against Apache NiFi

May 27, 2023October 14, 2025 Securonix

Attackers are actively scanning for unprotected Apache NiFi instances and add a malicious processor to NiFi to install a crypto miner, while also attempting lateral movement via SSH keys. Persistence is achieved through cron-based re-downloads, and scripts run…

Read More
Threat Research

GuLoader VBScript Variant Returns with PowerShell Updates

May 27, 2023October 17, 2025 Securonix

GuLoader’s VBScript variant uses a tax-themed lure and a multi-stage PowerShell chain to load shellcode and drop Remcos RAT, all while staying largely in memory and evading analysis. The TRU team details the execution flow, from initial user action to payload …

Read More
Threat Research

Lancefly APTグループ、カスタムバックドアで政府や航空部門などの組織を標的に

May 27, 2023October 16, 2025 Securonix

The article presents a large list of SHA-256 file hashes, described as a “File hash, simple list” related to LanceFly APT activity. It links to a Symantec Enterprise Blog post about LanceFly targeting government and aerospace sectors. #LanceFly #Symantec

Read More
Threat Research

Malware Spotlight: Camaro Dragon’s TinyNote Backdoor – Check Point Research

May 27, 2023October 15, 2025 Securonix

Check Point Research traces Camaro Dragon activity to a Go-based backdoor named TinyNote used against Southeast and East Asian foreign affairs targets, detailing its multi-stage persistence and C2 infrastructure. The campaign includes SmadAV evasion, ties to M…

Read More
Threat Research

New Horabot campaign targets the Americas

May 27, 2023October 16, 2025 Securonix

Horabot is a new PowerShell-based Outlook phishing botnet that delivers a Delphi-based banking trojan and a spam tool, active since 2020 and targeting Spanish-speaking users in the Americas. The campaign uses multi-stage phishing to propagate by compromising m…

Read More
Threat Research

When byte code bites: Who checks the contents of compiled Python files?

May 27, 2023October 16, 2025 Securonix

Two sentences summarize the campaign: a novel PyPI supply-chain attack embeds a compiled Python bytecode file (fshec2) to run malicious code and evade source-code scanners by loading the module with Importlib. The operation relies on a remote C2 to fetch comma…

Read More
Threat Research

Operation Triangulation: iOS devices targeted with previously unknown malware

May 27, 2023October 15, 2025 Securonix

Researchers from Kaspersky analyzed Operation Triangulation, a campaign targeting iOS devices by delivering exploits via iMessage attachments and loading stages from a C2 server to deploy a full APT platform. The operation has been ongoing since at least 2019 …

Read More
Threat Research

Operation CMDStealer: Financially Motivated Campaign Leverages CMD-Based Scripts and LOLBaS for Online Banking Theft in Portugal, Peru, and Mexico

May 27, 2023October 17, 2025 Securonix

An unknown financially motivated threat actor—likely from Brazil— targets Spanish- and Portuguese-speaking victims in Portugal, Mexico, and Peru to steal online banking access using CMD-based scripts and LOLBaS (Living Off the Land Binaries and Scripts). The c…

Read More
Threat Research

Supply Chain Risk from Gigabyte App Center Backdoor – Eclypsium | Supply Chain Security for the Modern Enterprise

May 26, 2023October 16, 2025 Securonix

Eclypsium reveals a backdoor-like risk in Gigabyte’s app center firmware where a Windows native executable is dropped into UEFI and executed at startup, enabling further payloads to be downloaded and run. The disclosure underscores supply-chain and local-envir…

Read More
Threat Research

Undercovering drIBAN fraud operations 2 | Cleafy Labs

May 26, 2023October 17, 2025 Securonix

Chapter 2 continues the Ramnit/drIBAN investigation, detailing how sLoad and Ramnit are connected and how MiTB attacks and injection kits are delivered. It covers Ramnit’s capabilities, the Lua-coded web inject kit, DGA-based C2, persistence, and anti-analysis…

Read More
Threat Research

Fresh Phish: ChatGPT Impersonation Fuels a Clever Phishing Scam

May 26, 2023October 16, 2025 Securonix

A clever phishing campaign impersonates OpenAI/ChatGPT branding and uses a personalized, IPFS-hosted link to harvest credentials. It combines brand forgery, display-address spoofing, and dynamic redirection to steal data while making takedown harder and avoidi…

Read More
Threat Research

CryptoClippy is Evolving to Pilfer Even More Financial Data

May 26, 2023October 14, 2025 Securonix

CryptoClippy is evolving beyond simple crypto-wallet theft to target a broader set of Brazilian payment services, using multi-stage delivery and data-exfiltration tactics. The campaign now leverages NSIS installers, PowerShell loaders, and UAC bypass to persis…

Read More
Threat Research

Shedding light on AceCryptor and its operation

May 26, 2023October 18, 2025 Securonix

AceCryptor is a long-running cryptor that packs tens of malware families and uses extensive obfuscation and anti-analysis techniques to hide its payload. ESET researchers describe its three-layer architecture, diverse distribution, and the scale of its impact …

Read More

Posts pagination

Previous 1 … 405 406 407 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.