Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Just Because It’s Old Doesn’t Mean You Throw It Away (Including Malware!) | FortiGuard Labs

February 27, 2023October 15, 2025 Securonix

Older malware can still pose a threat, as FortiGuard Labs documents a renewed MyDoom campaign that uses aged tools in new phishing lures and C2 techniques. The campaign deploys UPX-packed payloads, masquerades as legitimate Windows processes, and relies on rot…

Read More
Threat Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

February 27, 2023October 14, 2025 Securonix

MQsTTang is a new Mustang Panda backdoor that uses MQTT for C2 and operates as a single-stage, minimally obfuscated tool. The campaign targets government and diplomatic entities, employs spearphishing distribution with decoy filenames, and includes anti-analys…

Read More
Threat Research

Managed XDR Exposes Spear-Phishing Campaign Targeting Hospitality Industry Using RedLine Stealer

February 24, 2023October 15, 2025 Securonix

Trend Micro’s Managed XDR team uncovered a spear-phishing campaign targeting hospitality staff that delivers RedLine Stealer via oversized multi-stage payloads. The operation uses Dropbox/Bitly links, a PowerShell-based loader chain, and WMI-based data exfiltr…

Read More
Threat Research

EXFILTRATOR-22 – An Emerging Post-Exploitation Framework – CYFIRMA

February 23, 2023October 15, 2025 Securonix

CYFIRMA analyzes EXFILTRATOR-22, a new post-exploitation framework marketed via Telegram and YouTube with anti-analysis capabilities and an affiliate model. The actors use domain fronting and CDN infrastructure to conceal C2 traffic and promote a subscription-…

Read More
Threat Research

Can You See It Now? An Emerging LockBit Campaign | FortiGuard Labs

February 23, 2023October 14, 2025 Securonix

FortiGuard Labs describes a new LockBit ransomware campaign that uses a multi-stage, defense-evasion approach to bypass AV/EDR, including .img containers, UAC bypass, and auto-login persistence. The campaign targets Spanish-speaking firms in Mexico and Spain, …

Read More
Threat Research

BlackLotus UEFI bootkit: Myth confirmed

February 23, 2023October 16, 2025 Securonix

BlackLotus is a real UEFI bootkit that bypasses Secure Boot on up-to-date Windows 11 systems and establishes persistence via a MOK enrollment, delivering a kernel driver and HTTP downloader to fetch additional payloads. It exploits CVE-2022-21894, uses self-si…

Read More
Threat Research

Malware: The Rise of Threat Actors Using OneNote for Campaigns – InQuest

February 23, 2023October 13, 2025 Securonix

Microsoft OneNote is increasingly used as a carrier to deliver malware via phishing attachments, exploiting benign file formats to bypass defenses. The piece traces its evolution, highlights sample campaigns and loader stages, and outlines layered defenses org…

Read More
Threat Research

Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting

February 23, 2023October 13, 2025 Securonix

Trend Micro’s report details Iron Tiger’s update to SysUpdate, adding Linux-targeting capabilities and new C2 features, including DNS-based communication. It also notes hardened loading techniques, signed binaries abuse, and a lure using a chat application, in…

Read More
Threat Research

Blind Eagle Deploys Fake UUE Files and Fsociety to Target Colombia’s Judiciary, Financial, Public, and Law Enforcement Entities

February 23, 2023October 13, 2025 Securonix

Blind Eagle (APT-C-36) targeted Colombia and nearby Latin American entities with spear-phishing PDFs impersonating the DIAN tax authority to deploy a multi-stage infection chain, culminating in AsyncRAT payloads hosted via Discord. The campaign uses in-memory …

Read More
Threat Research

Snip3 Crypter Reveals New TTPs Over Time

February 23, 2023October 13, 2025 Securonix

ThreatLabz analyzes the Snip3 Crypter, a multi-stage RAT loader offered as a crypter-as-a-service, which deploys new TTPs to deliver DcRAT and QuasarRAT across multiple industries via spear-phishing. The campaigns repeatedly evolve techniques to evade detectio…

Read More
Threat Research

OneNote: A Growing Threat for Malware Distribution

February 23, 2023October 15, 2025 Securonix

Microsoft OneNote is becoming a growing vector for malware delivery, as threat actors embed malicious payloads in OneNote documents distributed via phishing emails and other deceptive tactics. Across multiple case studies, attackers use obfuscation and scripti…

Read More
Threat Research

New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign

February 23, 2023October 15, 2025 Securonix

Unidentified threat actor(s) have deployed MortalKombat ransomware alongside a GO variant of Laplas Clipper in a financially motivated campaign since December 2022, using phishing and an automated loader to drop payloads. The operation also leverages RDP scann…

Read More
Threat Research

Cyble – The Growing Threat Of ChatGPT-Based Phishing Attacks

February 22, 2023October 16, 2025 Securonix

Threat actors are weaponizing ChatGPT’s popularity to spread malware and phishing campaigns across Windows and Android, using fraudulent pages and typosquatted domains to lure victims into downloading malicious payloads. The campaigns distribute stealer malwar…

Read More
Threat Research

Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool

February 22, 2023October 22, 2025 Securonix

Trend Micro’s MxDR team found x32dbg.exe, a legitimate Windows debugger, being used to sideload a PlugX variant via DLL Search Order Hijacking. The operation establishes persistence across multiple locations, uses scheduled tasks and Run keys, and culminates i…

Read More
Threat Research

Blackfly: Espionage Group Targets Materials Technology

February 22, 2023October 13, 2025 Securonix

Blackfly (also known as APT41, Winnti Group, Bronze Atlas) continues targeting Asia, focusing on the materials and composites sector and hitting two subsidiaries of an Asian conglomerate to steal intellectual property. Researchers detail a late-2022 to early-2…

Read More

Posts pagination

Previous 1 … 425 426 427 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.