Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

URL files and WebDAV used for IcedID (Bokbot) infection

February 22, 2023October 15, 2025 Securonix

An ISC SANS diary documents an IcedID (Bokbot) infection that uses .url and WebDAV to fetch and run its payload, including a 64-bit DLL retrieved from mandalorecnote.com. The report catalogs the WebDAV activity, the payload delivery chain, and the IOCs and inf…

Read More
Threat Research

TA569 Threat Actor Overview: SocGholish & Beyond | Proofpoint US

February 22, 2023October 15, 2025 Securonix

TA569 operates a prolific injection-based operation delivering SocGholish and other payloads, functioning as an initial access broker and potentially a pay-per-install service. The campaigns rely on diverse injections, Traffic Distribution Services, and reinfe…

Read More
Threat Research

Cyble – Critical Vulnerability In FortiNAC (CVE-2022-39952) Exposes Multiple Organizations To Cyberattacks

February 22, 2023October 18, 2025 Securonix

Publicly released PoC for CVE-2022-39952 in FortiNAC enables threat actors to perform arbitrary file writes and potentially deploy web shells on vulnerable systems. The article highlights exposed FortiNAC instances, affected versions, and urges timely patching…

Read More
Threat Research

Team Cymru: From Chile with Malware – Tech Company Insights

February 22, 2023October 16, 2025 Securonix

Team Cymru tracks infrastructure linked to the IcedID threat, revealing a Chilean IP involved in accessing IcedID BackConnect/C2 activity and related DNS services. The findings show a network of domains, VPN usage, and tools frequently associated with IcedID o…

Read More
Threat Research

Securonix Threat Research Knowledge Sharing Series: Hiding the PowerShell Execution Flow

February 21, 2023October 16, 2025 Securonix

Securonix Threat Labs details multiple PowerShell methods attackers use to hide invoke-expression (IEX) execution, including string splitting, character substitution, variable extraction, wildcard “globfuscation”, reordering, DNS TXT retrieval, and XOR-encoded…

Read More
Threat Research

Magniber Ransomware’s Relaunch Technique – ASEC BLOG

February 21, 2023October 15, 2025 Securonix

Magniber has relaunched its campaign by delivering MSI installers through Edge and Chrome, after shifting away from the old IE vulnerability. It uses a loader that injects Magniber into user processes, persists via Run registry keys, and downloads a new instan…

Read More
Threat Research

Clasiopa: New Group Targets Materials Research

February 20, 2023October 23, 2025 Securonix

A hitherto unknown attack group named Clasiopa was observed targeting a materials research organization in Asia, wielding a distinct toolset that includes a custom backdoor (Atharvan). The operation exhibits multiple defense-evading and data-exfiltrating techn…

Read More
Threat Research

WinorDLL64: A backdoor from the vast Lazarus arsenal?

February 20, 2023October 16, 2025 Securonix

ESET researchers analyzed Wslink and its WinorDLL64 payload, a backdoor that loads in-memory modules and communicates over an existing Wslink connection. The backdoor collects extensive system information, manipulates files, and executes commands, with Lazarus…

Read More
Threat Research

Technical Advisory: Various Threat Actors Targeting ManageEngine Exploit CVE-2022-47966

February 20, 2023October 17, 2025 Securonix

Bitdefender Labs observed a global wave of opportunistic attacks exploiting CVE-2022-47966 in ManageEngine products, with 2,000–4,000 internet-facing servers potentially vulnerable. The advisory documents four attack clusters (Initial Access Brokers, Buhti Ran…

Read More
Threat Research

How NPM Packages Were Used to Spread Phishing Links

February 19, 2023October 13, 2025 Securonix

Checkmarx researchers uncovered a mass-spam campaign in the NPM ecosystem where automated processes published thousands of malicious packages that link to phishing campaigns. The operation involved automated package creation, masquerading as legitimate entries…

Read More
Threat Research

Technical Analysis of Rhadamanthys Obfuscation Techniques

February 18, 2023October 16, 2025 Securonix

Rhadamanthys is a two‑component information stealer consisting of a loader and a main module that exfiltrates credentials from KeePass, browsers, VPN clients, chat apps and cryptocurrency wallets. It employs VM‑based obfuscation, a custom embedded file system,…

Read More
Threat Research

Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1

February 18, 2023October 16, 2025 Securonix

Stealc is a copycat information stealer advertised by Plymouth, drawing on Vidar, Raccoon, Mars and Redline. Sekoia.io analyzes its features, C2 communications, infection chain, and ongoing development, noting its rapid uptake among cybercriminals. #Stealc #Vi…

Read More
Threat Research

HardBit 2.0 Ransomware

February 17, 2023October 16, 2025 Securonix

HardBit 2.0 is a ransomware variant observed from late 2022 that encrypts data after stealing sensitive information, negotiating ransom rather than paying a fixed bitcoin amount. It combines data theft, encryption, and multiple defense-evading and persistence …

Read More
Threat Research

Cyble – The Many Faces Of Qakbot Malware: A Look At Its Diverse Distribution Methods

February 17, 2023October 16, 2025 Securonix

Qakbot (QBot) is spread through multiple OneNote- and script-based channels, including OneNote attachments, WSF/JS/JSE/HTA paths, and HTML applications, each delivering a DLL payload that is executed via Rundll32 and often injected into processes. The campaign…

Read More
Threat Research

Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers

February 17, 2023October 13, 2025 Securonix

Royal ransomware has expanded its targets to Linux-based ESXi servers, introducing a Linux variant that encrypts files on virtualization hosts. The analysis outlines how the Linux variant uses ESXi tooling and traditional encryption (AES/RSA) to disrupt data c…

Read More

Posts pagination

Previous 1 … 426 427 428 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.