Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

The Phantom Menace: Brute Ratel remains rare and targeted

May 12, 2023October 13, 2025 Securonix

Brute Ratel remains rare and targeted, with limited real-world use and far fewer detections than Cobalt Strike. Sophos notes that cracked versions and targeted deployments have kept it from becoming the widespread threat feared, while defenders continue to mon…

Read More
Threat Research

SparkRAT Being Distributed Within a Korean VPN Installer – ASEC BLOG

May 12, 2023October 14, 2025 Securonix

ASEC reports SparkRAT was found distributed inside a VPN installer, indicating a supply-chain style compromise. The dropper creates SparkRAT in a local path, registers it for persistence, and enables remote control, information theft, and other malicious actio…

Read More
Threat Research

#StopRansomware: BianLian Ransomware Group | CISA

May 10, 2023October 15, 2025 Securonix

Two sentences summarizing: FBI, CISA, and ACSC describe BianLian ransomware and data-extortion group IOCs and TTPs identified through investigations as of March 2023, noting a shift from double-extortion to exfiltration-based extortion. The advisory covers ini…

Read More
Threat Research

BlackSuit Ransomware Strikes Windows And Linux Users – Cyble

May 10, 2023October 14, 2025 Securonix

Cyble Research and Intelligence Labs identifies BlackSuit ransomware targeting Windows and Linux, with its Linux variant sharing code with Royal ransomware. It uses command-line parameters, mutex-based single-instance checks, and network/share-based lateral mo…

Read More
Threat Research

8220 Gang Evolves With New Strategies

May 9, 2023October 15, 2025 Securonix

Trend Micro reports that the 8220 Gang has evolved its tactics, including Linux lwp-download exploits and CVE-2017-3506 in Oracle WebLogic to deploy cryptocurrency miners across Linux and Windows. The group uses PowerShell-based droppers, AMSI bypass technique…

Read More
Threat Research

More Supply Chain Attacks via Malicious Python Packages | FortiGuard Labs

May 9, 2023October 14, 2025 Securonix

FortiGuard Labs identified 30+ zero-day attacks in PyPI packages during a short window in late March to late April, revealing several families and methods used to weaponize the open-source Python ecosystem. The campaigns rely on malicious setup.py behavior tha…

Read More
Threat Research

Water Orthrus New Campaigns Deliver Rootkit and Phishing Modules

May 9, 2023October 16, 2025 Securonix

Water Orthrus has launched two campaigns, CopperStealth (rootkit delivery) and CopperPhish (credit card phishing), expanding their toolkit with a new rootkit and phishing modules. The campaigns share code traits with CopperStealer and indicate a shift toward t…

Read More
Threat Research

Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors

May 9, 2023October 14, 2025 Securonix

Lancefly’s recent activity centers on the Merdoor backdoor and ZXShell rootkit, targeting government, aviation, and other sectors with intelligence-gathering as a primary motive. The campaign shows adaptability in initial access vectors, credential theft via n…

Read More
Threat Research

Uncovering RedStinger – Undetected APT cyber operations in Eastern Europe since 2020

May 8, 2023October 16, 2025 Securonix

Red Stinger is an Eastern Europe–focused APT active since 2020, tracked publicly by Malwarebytes and Kaspersky under different aliases, with campaigns targeting Ukraine’s military, transportation, and critical infrastructure. The operation used a repeatable in…

Read More
Threat Research

Cyble – Dissecting Rancoz Ransomware

May 8, 2023October 13, 2025 Securonix

Rancoz is a rebranded ransomware variant that leverages leaked Vice Society code to tailor attacks for specific industries, organizations, or regions. It employs double extortion, real-time operation logging, and multi-thread encryption (ChaCha20-Poly and NTRU…

Read More
Threat Research

Cyble – Unraveling Akira Ransomware

May 8, 2023October 14, 2025 Securonix

Akira is a newly observed ransomware strain that uses double-extortion by exfiltrating data before encryption and threatening publication or sale of stolen information. Cyble CRIL documents its behavior, including drive enumeration, file targeting, ransom note…

Read More
Threat Research

Ransomware Roundup – Maori | FortiGuard Labs

May 8, 2023October 14, 2025 Securonix

FortiGuard Labs’ Ransomware Roundup highlights Maori, a Linux-targeting ransomware written in Go that encrypts files in the home directory and demands payment for decryption. The report notes ransom notes, contact methods via Tox and onionmail, and Fortinet pr…

Read More
Threat Research

Securonix Threat Labs Security Advisory: Latest Update: Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads

May 8, 2023October 16, 2025 Securonix

An unusual phishing campaign known as MEME#4CHAN delivers XWorm payloads through meme-filled PowerShell and obfuscated JavaScript, persisting for months and evolving with new payloads and obfuscation methods. The attack chain starts with phishing Word document…

Read More
Threat Research

Fake system update drops Aurora stealer via Invalid Printer loader

May 8, 2023October 16, 2025 Securonix

A malvertising campaign redirects Windows users to a convincing fake system update, delivering a loader that bypasses many AVs and sandboxes to drop Aurora Stealer. The operation uses a “Invalid Printer” loader, patches it to defeat sandbox checks, and exfiltr…

Read More
Threat Research

BPFDoor Malware Evolves – Stealthy Sniffing Backdoor ups its Game | Deep Instinct

May 7, 2023October 15, 2025 Securonix

BPFdoor is a Linux-focused stealth backdoor designed for long-term persistence, associated with the Red Menshen (Red Dev 18) threat actor. A new 2023 variant removes many hardcoded indicators, adds static library encryption via libtomcrypt, and uses a Berkeley…

Read More

Posts pagination

Previous 1 … 408 409 410 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.