Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

PlugX Malware Being Distributed via Vulnerability Exploitation – ASEC BLOG

March 6, 2023October 18, 2025 Securonix

ASEC reports the PlugX backdoor being installed through Sunlogin and AweSun remote control software via their remote code execution vulnerabilities, using a multi-stage dropper and DLL side-loading to decrypt and load PlugX in memory. The campaign links to Chi…

Read More
Threat Research

Cyble – BlackSnake Ransomware Emerges From Chaos Ransomware’s Shadow

March 6, 2023October 15, 2025 Securonix

Cyble researchers describe BlackSnake, a Chaos ransomware-derived variant that integrates a clipper module to steal cryptocurrency addresses and supports affiliate-driven deployment. The malware uses language checks, process and directory discovery, registry-b…

Read More
Threat Research

IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks

March 6, 2023October 15, 2025 Securonix

IceFire re-emerges with a Linux variant that targeted enterprise networks, expanding beyond its previous Windows focus. It exploits a deserialization vulnerability in IBM Aspera Faspex (CVE-2022-47986) to drop and execute a Linux payload that encrypts files an…

Read More
Threat Research

Old Cyber Gang Uses New Crypter – ScrubCrypt | FortiGuard Labs

March 4, 2023October 16, 2025 Securonix

Fortinet FortiGuard Labs tracked the 8220 Gang’s use of ScrubCrypt to obfuscate and encrypt payloads and deliver a Monero-mining operation via a WebLogic vulnerability. The operation combines PowerShell-based loading, in-memory execution, registry-based persis…

Read More
Threat Research

Nevada Ransomware: Yet Another Nokoyawa Variant

March 1, 2023October 18, 2025 Securonix

Zscaler ThreatLabz analyzed Nevada, a Rust-based variant of Nokoyawa ransomware, noting strong code similarities across Nokoyawa versions and two parallel branches in different languages. The findings describe hardcoded and CLI-configured encryption, shadow-co…

Read More
Threat Research

Qakbot Evolves to OneNote Malware Distribution

March 1, 2023October 16, 2025 Securonix

Two sentences summarizing the content. Trellix researchers document Qakbot’s evolution to OneNote-based malware distribution, showing how OneNote attachments deliver a loader DLL and the main Qakbot payload across multiple campaigns. The report also covers how…

Read More
Threat Research

Ransomware Roundup – Sirattacker and ALC | FortiGuard Labs

March 1, 2023October 28, 2025 Securonix

Fortinet’s FortiGuard Labs’ Ransomware Roundup highlights two notable variants, Sirattacker and ALC, detailing their execution methods, ransom notes, and observed activity, including Bitcoin wallet interactions associated with the Sirattacker actor. The report…

Read More
Threat Research

GlobeImposter Ransomware Being Distributed with MedusaLocker via RDP – ASEC BLOG

March 1, 2023October 14, 2025 Securonix

GlobeImposter ransomware is being distributed by MedusaLocker actors, with evidence suggesting the RDP vector facilitates initial access. The operation deploys Mimikatz and port scanners among other tools to map networks, exfiltrate credentials, and extend the…

Read More
Threat Research

Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities – Check Point Research

March 1, 2023October 19, 2025 Securonix

Check Point Research traces the evolution of Sharp Panda tools into a newer Soul malware framework used against Southeast Asian government entities, culminating in late-2022 activity that loaded the Soul modular backdoor. The report links these campaigns to a …

Read More
Threat Research

Bitdefender Labs warns of fresh phishing campaign that uses copycat ChatGPT platform to swindle eager investors

February 28, 2023October 18, 2025 Securonix

Bitdefender Antispam Labs warns of a fresh phishing campaign that uses a copycat ChatGPT platform to swindle eager investors. The scam targets several countries, leveraging unsolicited emails, a fake investment platform, and a call-center style operation to ha…

Read More
Threat Research

Spike in LokiBot Activity During Final Week of 2022

February 28, 2023October 17, 2025 Securonix

Unit 42 researchers uncover a LokiBot distribution campaign delivered via business email compromise (BEC) phishing emails, with an ISO payload that ultimately drops LokiBot. The analysis covers the loader and obfuscation, a persistence mechanism, and an HTTP-b…

Read More
Threat Research

Cyble – New WhiteSnake Stealer Offered For Sale Via MaaS Model

February 28, 2023October 16, 2025 Securonix

WhiteSnake is a cross-OS infostealer targeting Windows and Linux, offering multi-channel data theft capabilities and ongoing updates via threat actors. It exfiltrates collected data through a Telegram bot and is marketed with a MAAS-style model; the Linux vers…

Read More
Threat Research

SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft

February 28, 2023October 13, 2025 Securonix

Sysdig’s Threat Research Team uncovered SCARLETEEL, a sophisticated cloud-attack operation that started in a Kubernetes pod and escalated into AWS to steal proprietary software and credentials. The operation leveraged Terraform state and AWS services to move l…

Read More
Threat Research

Cyble – Ransomware Attack On IL&FS

February 28, 2023October 18, 2025 Securonix

LOCKBIT claimed to have compromised IL&FS in February 2023 and began a triple-extortion leak wave, threatening data deletion if demands weren’t met. The report covers the LOCKBIT Green variant, leaked data samples, and practical cybersecurity recommendations. …

Read More
Threat Research

OneNote Embedded file abuse

February 28, 2023October 17, 2025 Securonix

Threat actors are abusing OneNote’s embedded files feature in phishing campaigns by hiding and executing payloads behind embedded pictures. The article explains how this technique works, how to detect it with YARA rules, and how Microsoft blocks many of these …

Read More

Posts pagination

Previous 1 … 424 425 426 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.