Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG | CISA

May 7, 2023October 13, 2025 Securonix

FBI and CISA warn of active exploitation of CVE-2023-27350 in PaperCut MF/NG servers, enabling unauthenticated remote code execution. The Bl00dy Ransomware Gang targeted Education Facilities Subsector, exfiltrated data and encrypted systems, and a patch has be…

Read More
Threat Research

GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader | McAfee Blog

May 7, 2023October 16, 2025 Securonix

GuLoader (GULoader) campaigns deploy a highly evasive shellcode-based loader using NSIS-based installers delivered via malspam, incorporating XOR-encoded payloads and anti-analysis tricks. The article outlines a three-stage infection chain—shellcode deployment…

Read More
Threat Research

Deconstructing a Cybersecurity Event | Dragos

May 7, 2023October 16, 2025 Securonix

Dragos faced a failed extortion attempt after a cybercriminal group compromised a new sales employee’s personal email to access internal resources, but Dragos systems and controls remained uncompromised. The company blocked the account, engaged CrowdStrike and…

Read More
Threat Research

ASEC Weekly Malware Statistics (May 1st, 2023 – May 7th, 2023) – ASEC BLOG

May 7, 2023October 18, 2025 Securonix

ASEC’s RAPIT weekly analysis covers malware statistics from May 1–7, 2023, showing infostealers as the top category and AgentTesla leading the threat landscape. It details the main families (AgentTesla, Formbook, Amadey, GuLoader, Lokibot), their distribution,…

Read More
Threat Research

Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers

May 6, 2023October 16, 2025 Securonix

SentinelLabs identified 10 ransomware families using VMware ESXi lockers derived from the 2021 Babuk leaks, showing a growing adoption of Babuk code for ESXi lockers. Leaked Babuk source enables actors to target Linux systems and complicates attribution as mor…

Read More
Threat Research

Deep Dive Into DownEx Espionage Operation in Central Asia

May 6, 2023October 15, 2025 Securonix

Bitdefender uncovered DownEx, a newly identified espionage malware family targeting Central Asia (Kazakhstan and Afghanistan) with a data-exfiltration focus and a multi-stage attack chain. The operation combines spear-phishing, a disguised Word document launch…

Read More
Threat Research

Analysis of CLR SqlShell Used to Attack MS-SQL Servers – ASEC BLOG

May 6, 2023October 15, 2025 Securonix

CLR SqlShell is a DLL-based malware component used on MS-SQL servers to run threat actor commands and enable post-exploitation activities, including loading additional malware like CoinMiner or ransomware. The article details how various SqlShell variants abus…

Read More
Threat Research

Malspam campaign delivering PowerDash – a tiny PowerShell backdoor

May 6, 2023October 16, 2025 Securonix

A late-April malspam campaign delivers a previously unseen PowerShell malware family dubbed PowerDash, using a Word document exploiting CVE-2017-0199 to drop further payloads. The operation employs VBScript to PowerShell chaining, HTA-based stagers for persist…

Read More
Threat Research

Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution | McAfee Blog

May 6, 2023October 16, 2025 McAfee

Authored by By Yashvi Shah  McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at…
The post Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution appeared first on McAfee Blog….

Read More
Threat Research

RapperBot DDoS Botnet Expands into Cryptojacking | FortiGuard Labs

May 5, 2023October 17, 2025 Securonix

FortiGuard Labs documents RapperBot expanding from a DDoS botnet into cryptojacking on Intel x64 machines by merging the bot with an XMRig miner. The campaign updates include a revamped C2 protocol, multi-layer encoding to evade detection, and SSH-key persiste…

Read More
Threat Research

Cofense Intelligence Strategic Analysis Report | Cofense

May 5, 2023October 17, 2025 Securonix

Cofense Intelligence analyzes credential phishing that uses man-in-the-middle (MiTM) attacks to proxy authentication between users and destinations, enabling harvesting of usernames, passwords, and session cookies and potentially bypassing MFA. The report note…

Read More
Threat Research

Threat Assessment: Royal Ransomware

May 4, 2023October 15, 2025 Securonix

Royal ransomware is a private group formed by former Conti members that has targeted critical infrastructure, notably healthcare, since September 2022. It uses BATLOADER to drop a Cobalt Strike beacon and has expanded to a Linux/ESXi variant, with public extor…

Read More
Threat Research

BEWARE: Fake Applications are Disguised as Legitimate Ones

May 4, 2023October 14, 2025 Securonix

The article explains how threat actors use fake applications impersonating trusted brands (notably IRCTC) to deceive users into downloading spyware, with social engineering and phishing as core tactics. It analyzes an IRCTC advisory, details the spyware’s capa…

Read More
Threat Research

SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey

May 3, 2023October 14, 2025 Securonix

SideWinder has been observed employing server-side polymorphism to deliver campaigns against Pakistan government officials, and the operation is now targeting Turkey. Campaigns rely on dynamically generated payloads delivered via malicious RTF attachments and …

Read More
Threat Research

AndoryuBot – New Botnet Campaign Targets Ruckus Wireless Admin Remote Code Execution Vulnerability (CVE-2023-25717)b| FortiGuard Labs

May 3, 2023October 14, 2025 Securonix

Fortinet FortiGuard Labs documents a new botnet named AndoryuBot that targets Ruckus Wireless Access Points via CVE-2023-25717 to gain control of devices. The malware then uses a SOCKS-based C2, downloads a propagation script, and implements DDoS capabilities.…

Read More

Posts pagination

Previous 1 … 409 410 411 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.