Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

April 17, 2023October 14, 2025 Securonix

ESET researchers link Lazarus to the 3CX supply-chain attack, detailing Operation DreamJob’s Linux payload OdicLoader delivering the SimplexTea backdoor via OpenDrive. The findings reinforce Lazarus’s cross-OS toolkit (Windows, macOS, Linux) and its engagement…

Read More
Threat Research

Daggerfly: APT Actor Targets Telecoms Company in Africa

April 17, 2023October 13, 2025 Securonix

Symantec Threat Hunter details Daggerfly/MgBot activity targeting telecoms in Africa and Asia, highlighting a modular malware framework used for extensive information gathering. The campaign shows ongoing tool development, credential dumping, AD enumeration, a…

Read More
Threat Research

Threat Actors Rapidly Adopt Web3 IPFS Technology

April 17, 2023October 16, 2025 Securonix

Unit 42 observed a rapid shift toward using IPFS as a vehicle for malicious activity in 2022, spanning phishing, credential theft, C2 communications, and payload delivery. The decentralized, bullet-proof hosting nature of IPFS makes takedowns difficult, enabli…

Read More
Threat Research

ā€˜AuKill’ EDR killer malware abuses Process Explorer driver

April 17, 2023October 15, 2025 Securonix

AuKill is a defense-evasion tool that exploits an outdated Microsoft Process Explorer driver to disable EDR protections and then deploys ransomware, with multiple variants observed since 2023. The technique, a BYOVD (bring-your-own vulnerable driver) approach,…

Read More
Threat Research

Play Ransomware Group Using New Custom Data-Gathering Tools

April 16, 2023October 19, 2025 Securonix

Play ransomware group (Balloonfly) has been observed using new custom data-gathering tools to enumerate software, backups, and remote admin utilities, exfiltrate the data, and compress it for leakage. The article also covers the VSS-based copy technique, log d…

Read More
Threat Research

BlackBit Ransomware Being Distributed in Korea – ASEC BLOG

April 16, 2023October 21, 2025 Securonix

ASEC reports BlackBit ransomware being distributed in Korea, masquerading as svchost.exe and active since September of last year. It obfuscates with .NET Reactor and shows traits similar to LokiLocker; the campaign includes persistence, recovery prevention, an…

Read More
Threat Research

Bumblebee Malware Distributed Via Trojanized Installer Downloads

April 14, 2023October 15, 2025 Securonix

Two sentences summarizing the article. Bumblebee malware was distributed via trojanized installers for Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace, using a malicious Google Ad chain and a compromised WordPress site to drive victims to fake download p…

Read More
Threat Research

Cyber Espionage in India: Decoding APT-36’s New Linux Malware Campaign

April 14, 2023October 16, 2025 Securonix

Uptycs researchers uncovered Poseidon, a Linux backdoor tied to APT-36 (Transparent Tribe), delivered via a tainted Kavach 2FA tool to compromise Indian government-related systems. Poseidon functions as a versatile backdoor offering keystroke logging, screen c…

Read More
Threat Research

From Google Ads Abuse to a Massive Spear-Phishing Campaign Impersonating Spain’s Tax Agency

April 14, 2023October 17, 2025 Securonix

BlackBerry Threat Research tracks two parallel campaigns using the same infrastructure: a Google Ads malvertising campaign pushing fake software (Vidar and IcedID) and a massive spear-phishing campaign impersonating Spain’s tax agency AEAT to harvest credentia…

Read More
Threat Research

EPOS Net Phishing Scheme That Turns Trust Against | Cofense

April 13, 2023October 13, 2025 Securonix

A sophisticated phishing campaign targeted EPOS Net customers with meticulously crafted emails and a cloned website designed to harvest banking information and OTP data. The attackers leveraged spoofed emails and real EPOS support numbers to create legitimacy …

Read More
Threat Research

Cyble – CrossLock Ransomware Emerges: New GoLang-Based Malware On The Horizon

April 13, 2023October 13, 2025 Securonix

CrossLock is a Go-based ransomware that encrypts victims’ data and exfiltrates it for double-extortion. It uses ETW event tracing bypass, extensive cleanup of backups and logs, and service disruption to hinder recovery and pressure victims to pay. #CrossLock #…

Read More
Threat Research

Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets | Microsoft Security Blog

April 13, 2023October 15, 2025 Securonix

Mint Sandstorm (PHOSPHORUS) has refined its tradecraft, weaponizing new-day vulnerabilities and conducting targeted phishing to access high-value targets in energy and transportation sectors. The group develops bespoke tooling (Drokbk, Soldier, CharmPower) and…

Read More
Threat Research

Introducing DevOpt: A Multifunctional Backdoor Arsenal

April 13, 2023October 13, 2025 Securonix

Zscaler ThreatLabz uncovered a new multifunctional backdoor named DevOpt, built with Free Pascal, capable of keylogging, stealing browser credentials, clipper functionality, and persistence. The campaign shows two development variants, lure infrastructure on a…

Read More
Threat Research

in2al5d p3in4er is Almost Completely Undetectable

April 13, 2023October 14, 2025 Securonix

The in2al5d p3in4er loader is a highly evasive component that powers Aurora’s delivery chain. Morphisec explains its anti-VM checks, runtime payload decryption, process hollowing, and decoy-website/social-engineering techniques that rely on YouTube distributio…

Read More
Threat Research

Trigona Ransomware Attacking MS-SQL Servers – ASEC BLOG

April 13, 2023October 17, 2025 Securonix

Trigona ransomware campaigns target poorly managed MS-SQL servers, leveraging a CLR SqlShell dropper and service-based execution to escalate privileges and encrypt data. The operation includes credential abuse, registry and Run key persistence, and a ransom no…

Read More

Posts pagination

Previous 1 … 414 415 416 … 490 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.