Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram

April 27, 2023October 14, 2025 Securonix

Atomic Stealer is a macOS infostealer sold via Telegram with multiple variants (A, B, C) and a web panel for campaign management. The article details how each variant operates, what data it targets (keychains, crypto wallets, browser data), and provides indica…

Read More
Threat Research

Raspberry Robin: A global USB malware campaign providing access to ransomware operators

April 27, 2023October 18, 2025 Securonix

Raspberry Robin is a global USB-based malware campaign that acts as a loader, delivering ransomware operators and other loaders to target networks. It propagates via infected USB drives, uses legitimate Windows binaries to execute payloads, and relies on compr…

Read More
Threat Research

Polish Healthcare Industry Targeted by Vidar Infostealer Likely Linked to Djvu Ransomware

April 27, 2023October 15, 2025 Securonix

Two sentences summarizing the content here. EclecticIQ links a spearphishing campaign against Poland’s healthcare sector to Vidar Infostealer, with overlaps to Djvu and LockBit 2.0 ransomware activity, and describes how Vidar collects sensitive data and exfilt…

Read More
Threat Research

Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale

April 27, 2023October 15, 2025 Securonix

Malware configurations reveal attacker campaigns and behaviors by exposing in-memory configuration data, as demonstrated with IcedID’s encrypted stage-one and stage-two configurations decoded through dynamic analysis. The article also outlines how to scale con…

Read More
Threat Research

A LNK Between Browsers: Hunting Methodologies and Extension Abusing Actors | Mandiant

April 27, 2023October 16, 2025 Securonix

Mandiant outlines a chain where a tampered LNK shortcut launches a legitimate Chromium-based browser, loading a malicious extension to achieve persistence. The research tracks multiple malware families—RILIDE, BRAINFOG, BRAINSTORM, and BRAINLINK—and details th…

Read More
Threat Research

ā€œMalverpostingā€ā€Šā€”ā€ŠWith Over 500K Estimated Infections, Facebook Ads Fuel This Evolving Stealer…

April 26, 2023October 14, 2025 Guardio-Security

A large-scale “Malverposting” campaign abusing Facebook Ads has pushed adult-themed promoted posts that lead to ZIP downloads containing masqueraded executables; the operation is linked to a Vietnamese threat actor and is estimated to have surpassed 500k infec…

Read More
Threat Research

Chain Reaction: ROKRAT’s Missing Link – Check Point Research

April 26, 2023October 18, 2025 Securonix

Checkpoint Research tracks how ROKRAT’s deployment has evolved into LNK-based, multi-stage infection chains that bypass macro restrictions, showing a shift from documents with macros to oversized LNK loaders. The campaigns target South Korean affairs, link to …

Read More
Threat Research

Dark Web Profile: BlackByte Ransomware – SOCRadarĀ® Cyber Intelligence Inc.

April 26, 2023October 15, 2025 Securonix

The article analyzes BlackByte, a Russian-based ransomware operation operating as a RaaS that uses double-extortion and has evolved its techniques since 2021, including a shift from C# to GoLang and the use of legitimate tools. It also highlights notable incid…

Read More
Threat Research

Recent Trends in Internet Threats: Common Industries Impersonated in Phishing Attacks, Web Skimmer Analysis and More

April 26, 2023October 17, 2025 Securonix

Unit 42 analyzed over 67 million malicious URLs, domains, and IPs observed in H2 2022, highlighting trends in phishing, malicious JavaScript, and web skimmers, including a case study on a Tranco top 1 million site. The report notes concentration of hosting in …

Read More
Threat Research

Attack on Security Titans: Earth Longzhi Returns With New Tricks

April 26, 2023October 14, 2025 Securonix

Earth Longzhi, a subgroup of APT41, has resurfaced with new techniques targeting Taiwan, Thailand, the Philippines, and Fiji, including DLL sideloading and BYOVD driver abuse to disable defenses. The campaign also introduces stack rumbling via IFEO, RPC-based …

Read More
Threat Research

CoinMiner (KONO DIO DA) Distributed to Linux SSH Servers – ASEC BLOG

April 25, 2023October 14, 2025 Securonix

ASEC reports ongoing campaigns where XMRig CoinMiner is installed on poorly managed Linux SSH servers, using SHC-built malware and creating backdoor SSH accounts for persistence. The attacks, attributed to the KONO DIO DA threat actor, involve dictionary/dicti…

Read More
Threat Research

Cyble – Citrix Users At Risk: AresLoader Spreading Through Disguised GitLab Repo

April 25, 2023October 16, 2025 Securonix

CRIL researchers describe AresLoader, a multiclass loader used to spread LummaStealer and IcedID via a disguised GitLab repo, targeting Citrix users. The malware uses multi-stage delivery, dynamic API resolution, and various anti-analysis techniques to evade d…

Read More
Threat Research

Elastic Security Labs discovers the LOBSHOT malware — Elastic Security Labs

April 24, 2023October 19, 2025 Securonix

Elastic Security Labs uncovers LOBSHOT, a stealthy hVNC-capable malware tied to TA505, spread via malvertising campaigns that impersonate legitimate software. The analysis provides a YARA signature and a configuration extractor, detailing infection, persistenc…

Read More
Threat Research

Ransomware Roundup – UNIZA | FortiGuard Labs

April 24, 2023October 18, 2025 Securonix

FortiGuard Labs analyzes the UNIZA ransomware, a Windows-targeting variant that encrypts user files and displays its ransom message via the Command Prompt. It also notes the likely phishing-based infection vector, limited current spread, and Fortinet protectio…

Read More
Threat Research

ASEC Weekly Phishing Email Threat Trends (April 9th, 2023 – April 15th, 2023) – ASEC BLOG

April 24, 2023October 14, 2025 Securonix

ASEC monitors phishing email threats focused on attachments, highlighting FakePage as the dominant method that imitates real login pages to harvest credentials, followed by Downloader, Worm, and Infostealer families distributing malware and stealing data. The …

Read More

Posts pagination

Previous 1 … 411 412 413 … 490 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.