Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

NOBELIUM Uses Poland’s Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine

March 8, 2023October 17, 2025 Securonix

NOBELIUM (APT29) has launched a targeted EU campaign aimed at governments assisting Ukraine, utilizing geopolitically themed lure content tied to Poland’s diplomatic activity. The operation combines weaponized HTML/ISO dropper techniques and Notion-based C2 th…

Read More
Threat Research

Mallox Ransomware Being Distributed in Korea – ASEC BLOG

March 8, 2023October 15, 2025 Securonix

ASEC/ASEC Security Emergency Response Center (AhnLab) reports Mallox ransomware distribution in Korea, targeting vulnerable MS-SQL servers. The malware disguises as a DirectPlay-related program, downloads a Base64-encoded DLL, uses PowerShell and process injec…

Read More
Threat Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

March 8, 2023October 14, 2025 Securonix

ESET linked a campaign to the Tick APT group targeting an East Asian data-loss prevention (DLP) software developer, where attackers trojanized installers and compromised update servers to spread malware to the company’s customers. The operation involved Shadow…

Read More
Threat Research

Attackers Increasingly Abusing DigitalOcean to Host Scams and Phishing

March 8, 2023October 14, 2025 Securonix

Two sentences: Netskope Threat Labs observed a 17x increase in traffic to malicious pages hosted on DigitalOcean, driven by new campaigns of tech support scams mimicking Windows Defender and by phishing pages targeting financial institutions and webmail users.…

Read More
Threat Research

Using Memory Analysis to Detect EDR-Nullifying Malware

March 7, 2023October 15, 2025 Volexity

Volexity describes how the AVBurner tool (attributed to the SnakeCharmer/Earth Longzhi actor) disables EDR/AV by patching Windows kernel process-creation callback entries so security drivers appear loaded but are neutered. The post shows how to detect this tam…

Read More
Threat Research

Prometei botnet improves modules and exhibits new capabilities in recent updates

March 7, 2023October 14, 2025 Securonix

Prometei v3 continues to evolve with updated execution-chain modules, self-updating capabilities, and a bundled Apache webserver with a PHP web shell, expanding both Windows and Linux variants. The threat remains financially driven, targeting a wide global vic…

Read More
Threat Research

Emotet Sending Malicious Emails After Three-Month Hiatus

March 7, 2023October 18, 2025 Securonix

Emotet malware activity has resumed, delivering non-password-protected ZIP attachments containing Office documents with macros that download and execute the Emotet DLL. Modern Emotet can be used for ransomware, DDoS, and credential theft, and can spread across…

Read More
Threat Research

Overview of a Mirai Payload Generator

March 7, 2023October 15, 2025 Securonix

A detailed look at a Mirai payload generator shows how Linux devices were being abused to deliver Mirai payloads across multiple architectures using web, FTP, and TFTP services. The post also describes a backdoor created via a rogue root account and multi-arch…

Read More
Threat Research

CHM Malware Disguised as North Korea-related Questionnaire (Kimsuky) – ASEC BLOG

March 7, 2023October 16, 2025 Securonix

A CHM-based malware campaign attributed to the Kimsuky group has been identified, delivered via password-protected email attachments disguised as North Korea-related interview requests to exfiltrate user data. The malware uses a shortcut object to execute comm…

Read More
Threat Research

FiXS the new ATM Malware in LATAM – Metabase Q

March 7, 2023October 15, 2025 Securonix

A new ATM malware variant named FiXS has been identified by Metabase Q, targeting Mexican banks and other LATAM institutions by leveraging a vendor-agnostic approach to ATM XFS middleware and an external keyboard for its criminal operators. The malware uses a …

Read More
Threat Research

New HiatusRAT router malware covertly spies on victims – Lumen

March 6, 2023October 14, 2025 CTI

Lumen Black Lotus Labs discovered the “Hiatus” campaign that compromises business-grade DrayTek Vigor routers to deploy HiatusRAT and a tcpdump variant, enabling remote access, SOCKS5 proxying, and packet capture. Lumen observed ~100 infected routers (primaril…

Read More
Threat Research

Suspected Chinese Campaign to Persist on SonicWall Devices, Highlights Importance of Monitoring Edge Devices | Mandiant

March 6, 2023October 16, 2025 Securonix

Mandiant, with SonicWall PSIRT, identifies a suspected Chinese campaign that maintains long-term persistence by running malware on an unpatched SonicWall SMA appliance, with capabilities to steal credentials, provide shell access, and survive firmware upgrades…

Read More
Threat Research

Netcat Attack Cases Targeting MS-SQL Servers (LOLBins) – ASEC BLOG

March 6, 2023October 20, 2025 Securonix

ASEC reports Netcat-laced campaigns targeting poorly managed MS-SQL servers, leveraging multiple tools (including Cobalt Strike, RasmanPotato, Stowaway, and SharpDecryptPwd) to gain control, escalate privileges, and move laterally. The operation employs LOLBin…

Read More
Threat Research

BatLoader Continues to Abuse Google Search Ads to Deliver Vidar…

March 6, 2023October 17, 2025 Securonix

BatLoader continues to abuse Google Search Ads to deliver Vidar Stealer and Ursnif by masquerading as legitimate software and using Windows Installer and Python-based loaders to fetch and run payloads. The campaign also impersonates popular apps (ChatGPT, Zoom…

Read More
Threat Research

GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers

March 6, 2023October 18, 2025 Securonix

GoBruteforcer is a Golang-based botnet that targets web servers running phpMyAdmin, MySQL, FTP, and Postgres, using CIDR-range scanning and brute-force login to gain access. It then deploys an IRC-based C2 bot, a web shell, and persists via cron, with ongoing …

Read More

Posts pagination

Previous 1 … 423 424 425 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.