Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

No More Macros? Better Watch Your Search Results!

April 24, 2023October 18, 2025 Securonix

SEO poisoning is described as a rising method threat actors use to seed malicious sites in top search results after blocking malicious macros in Office. The article analyzes the Gootkit loader’s multi-stage delivery, decoding, and C2 behavior, highlighting how…

Read More
Threat Research

Rapture, a Ransomware Family With Similarities to Paradise

April 24, 2023October 18, 2025 Securonix

Rapture is a ransomware family observed in March–April 2023 that is packed with Themida and shows similarities to Paradise yet behaves distinctly. The attackers leverage memory-based execution via a Cobalt Strike beacon, staged through PowerShell and WMI, to d…

Read More
Threat Research

ASEC Weekly Malware Statistics (November 21st, 2022 – November 27th, 2022) – ASEC BLOG

April 24, 2023October 20, 2025 Securonix

The ASEC weekly malware statistics summarize the top families by distribution from November 21–27, 2022, led by AgentTesla and SmokeLoader. The post also details their command-and-control infrastructure and common disguise techniques such as invoices and purch…

Read More
Threat Research

Magecart threat actor rolls out convincing modal forms

April 22, 2023October 14, 2025 Securonix

Researchers detail a Magecart campaign in which a threat actor uses a custom fraudulent modal to hijack checkout and steal credit card data from compromised Prestashop stores. The skimmer relies on a well-crafted modal, dynamic HTML, obfuscated code, and a red…

Read More
Threat Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

April 22, 2023October 16, 2025 Securonix

ESET researchers linked a campaign to the Evasive Panda APT group that hijacked update channels of legitimate Chinese software to deliver MgBot, the group’s flagship backdoor. The report also details MgBot’s modular plugin toolkit and analyzes two main deliver…

Read More
Threat Research

Cyble – Threat Actor Selling New Atomic MacOS (AMOS) Stealer On Telegram

April 22, 2023October 15, 2025 Securonix

Cyble researchers reveal a Golang-based macOS stealer named Atomic macOS Stealer (AMOS) advertised on Telegram, designed to exfiltrate a wide range of victim data. The malware collects keychain passwords, system information, Desktop/Documents files, macOS pass…

Read More
Threat Research

Fakecalls Android Malware Abuses Legitimate Signing Key | McAfee Blog

April 21, 2023October 15, 2025 McAfee

Authored by Dexter Shin  McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate…
The post Fakecalls Android Malware Abuses Legitimate Signing Key appeared first on McAfee Blog….

Read More
Threat Research

Attackers Use Containers for Profit via TrafficStealer

April 21, 2023October 15, 2025 Securonix

TrafficStealer uses Docker containers to generate revenue by proxying users’ traffic and manipulating ad engagement, turning honeypots into monetization machines. Attackers leverage public container images and automation via YAML to scale the operation, while …

Read More
Threat Research

RTM Locker Ransomware as a Service (RaaS) Now on Linux – Uptycs

April 21, 2023October 16, 2025 Securonix

RTM Locker marks the RTM group’s first Linux ransomware binary, targeting Linux, NAS, and ESXi hosts, and appears inspired by Babuk’s leaked source code, using ECDH Curve25519 and ChaCha20 for file encryption. Uptycs provides detection guidance with XDR and YA…

Read More
Threat Research

First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters

April 21, 2023October 17, 2025 Aquasec

Researchers documented the first evidence of attackers abusing Kubernetes RBAC to backdoor clusters, using DaemonSets to hijack resources and mining Monero across numerous targets. The activity highlights how misconfigurations can enable persistence and widesp…

Read More
Threat Research

Cyble – Print Management Software PaperCut Actively Exploited In The Wild

April 21, 2023October 16, 2025 Securonix

PaperCut CVE-2023-27350 and CVE-2023-27351 allow remote code execution and authentication bypass on PaperCut MF/NG servers, with unpatched systems actively exploited in the wild. The article highlights PoC dispersion via hacktivist channels and rising ransomwa…

Read More
Threat Research

Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware

April 21, 2023October 14, 2025 Securonix

BellaCiao is a highly customized dropper linked to Charming Kitten (APT35) that targets US, European, Middle Eastern, and Indian victims with victim-specific data and C2 communication. The implant combines a tailored payload, a DNS-based command channel, and m…

Read More
Threat Research

Chinese Alloy Taurus Updates PingPull Malware

April 21, 2023October 14, 2025 Securonix

Unit 42 identified a new PingPull Linux variant used by Alloy Taurus, alongside a related backdoor dubbed Sword2033, expanding their Linux-focused espionage toolkit. The findings link these tools to Alloy Taurus’s C2 infrastructure and regional activity in Sou…

Read More
Threat Research

Zero Day Initiative — TP-Link WAN-side Vulnerability CVE-2023-1389 Added to the Mirai Botnet Arsenal

April 21, 2023October 16, 2025 Securonix

Zero Day Initiative flagged Mirai expanding its toolkit by incorporating CVE-2023-1389 to target TP-Link Archer AX21 routers, with evidence of active exploitation starting in April after TP-Link’s patch. The malware downloads and executes architecture-specific…

Read More
Threat Research

Tonto Team Using Anti-Malware Related Files for DLL Side-Loading – ASEC BLOG

April 21, 2023October 14, 2025 Securonix

The Tonto Team targets mainly Asian countries and has been distributing Bisonal malware, using anti-malware-related files to facilitate DLL side-loading. ASECs analysis traces evolving CHM-based campaigns in Korea, persistence via RUN keys, and C2 communicatio…

Read More

Posts pagination

Previous 1 … 412 413 414 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.