Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities

March 31, 2023October 17, 2025 Securonix

Typhon Reborn V2 is a rebuilt information stealer with significantly enhanced anti-analysis, anti-VM, and obfuscation capabilities, designed to evade security researchers and detections. It exfiltrates collected data via Telegram and is sold cheaply on undergr…

Read More
Threat Research

Rorschach – A New Sophisticated and Fast Ransomware – Check Point Research

March 31, 2023October 13, 2025 Securonix

Two sentences summarizing the article: Check Point researchers identified a new ransomware strain named Rorschach that was deployed against a US-based company, notable for its lack of branding and autonomous capabilities. The malware combines novel evasion, ul…

Read More
Threat Research

Proxyjacking has Entered the Chat

March 31, 2023October 15, 2025 Securonix

Sysdig’s Threat Research Team (TRT) uncovered proxyjacking, where attackers leverage the Log4j vulnerability to gain access to a container and then turn compromised pods into proxy servers to monetize IP addresses via proxyware services such as Pawns.app, IPRo…

Read More
Threat Research

Verblecon: Sophisticated New Loader Used in Low-level Attacks

March 31, 2023October 15, 2025 Securonix

Symantec tracks a new loader called Verblecon (Trojan.Verblecon) used in low-reward attacks to install cryptocurrency miners and potentially steal Discord access tokens, with greater danger if leveraged in ransomware or espionage. First spotted in January 2022…

Read More
Threat Research

3CX Supply Chain Compromise Leads to ICONIC Incident

March 30, 2023October 13, 2025 Volexity

Volexity analyzed a supply-chain compromise of the 3CX Desktop App in which a malicious ffmpeg library inserted into signed installers decoded encrypted blobs, fetched staged payloads, and reflectively loaded a 64-bit information-stealer dubbed ICONIC/ICONICST…

Read More
Threat Research

Dissecting AlienFox | The Cloud Spammer’s Swiss Army Knife

March 30, 2023October 15, 2025 SentinelOne

A sophisticated new toolset is being used to harvest credentials from multiple cloud service providers, including AWS SES and Microsoft Office 365.

Read More
Threat Research

Mantis: New Tooling Used in Attacks Against Palestinian Targets

March 30, 2023October 14, 2025 Securonix

The Mantis threat group (Arid Viper/Desert Falcon) continues targeting Palestinian organizations with a refreshed toolset and a persistent presence across networks. The campaign centers on updated Micropsia and Arid Gopher backdoors, credential theft, and data…

Read More
Threat Research

Ransomware Roundup – Dark Power and PayMe100USD Ransomware | FortiGuard Labs

March 30, 2023October 14, 2025 Securonix

Fortinet FortiGuard Labs’ bi-weekly Ransomware Roundup highlights Dark Power and PayME100USD, outlining their file-encrypting behavior on Windows and the actor’s apparent data-leak threats, with Fortinet-provided protections and best practices. The report note…

Read More
Threat Research

Rhadamanthys: The “Everything Bagel” Infostealer – Check Point Research

March 30, 2023October 15, 2025 Securonix

Rhadamanthys is a feature-rich infostealer that debuted on the dark web and has drawn attention for its expansive, “everything on a bagel” design. The Check Point Research analysis covers its multi-stage loader, forensic methods to resolve in-memory API calls,…

Read More
Threat Research

Cyble – Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide

March 30, 2023October 13, 2025 Securonix

Cyble detailed Cl0p Ransomware’s global activity, highlighting its shift to a Ransomware-as-a-Service model, double extortion, and multi-vector infection techniques across industries and regions. It also notes Linux variants and a public leak site, with techni…

Read More
Threat Research

Nevada Ransomware Being Distributed in Korea – ASEC BLOG

March 29, 2023October 16, 2025 Securonix

ASEC researchers detected Nevada ransomware distribution, noting its Rust-based implementation and the use of the .NEVADA extension for encrypted files. The malware supports command-line options to tailor encryption, creates README.txt ransom notes with a Tor …

Read More
Threat Research

The Rise of FusionCore An Emerging Cybercrime Group from Europe – CYFIRMA

March 29, 2023October 14, 2025 Securonix

FusionCore is a European threat actor group that operates Malware-as-a-Service and hacker-for-hire operations, offering a wide catalog of custom malware and a ransomware affiliate program. They leverage phishing as their main initial-access vector, run a websh…

Read More
Threat Research

Malicious ISO File Leads to Domain Wide Ransomware

March 28, 2023October 19, 2025 TheDFIR

IcedID was delivered via malspam as an ISO image, which after mounting loaded a hidden LNK that ultimately dropped IcedID and a batch to disk, enabling domain-wide ransomware. The attackers used IcedID as a loader for Cobalt Strike, conducted extensive discove…

Read More
Threat Research

New Infostealer LummaC2 Being Distributed Disguised As Illegal Cracks – ASEC BLOG

March 28, 2023October 16, 2025 Securonix

LummaC2 is a new Infostealer sold on the dark web and spread by a threat group disguising it as illegal cracks and keygens. The campaign uses obfuscation, anti-sandbox checks, and C2 communications to exfiltrate data from targeted browsers and wallet apps. #Lu…

Read More
Threat Research

Tracking the CHM Malware Using EDR – ASEC BLOG

March 28, 2023October 16, 2025 Securonix

ASEC reports a CHM-based APT technique where threat actors use Compiled HTML Help Files to execute malware via hh.exe, download a PowerShell script, and run it through mshta.exe. The operation culminates in persistence via the Run registry key and C2 communica…

Read More

Posts pagination

Previous 1 … 418 419 420 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.