Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

SOC Team Essentials | How to Investigate and Track the 8220 Gang Cloud Threat

February 17, 2023October 19, 2025 Securonix

8220 Gang is a low-skill crimeware actor known for infecting cloud hosts via SSH brute forcing and exposed services. The article walks through an educational SOC investigation of the group’s infection script, payloads, and infrastructure to help analysts track…

Read More
Threat Research

Developers beware: Imposter HTTP libraries lurk on PyPI

February 17, 2023October 13, 2025 Securonix

Researchers from ReversingLabs found a surge of malicious PyPI packages masquerading as HTTP libraries, using typosquatting and deceptive naming to distribute downloaders and info stealers. The campaign shows how open-source repositories continue to be abused …

Read More
Threat Research

HardBit 2.0 Ransomware

February 17, 2023October 16, 2025 Securonix

HardBit 2.0 is a ransomware variant observed from late 2022 that encrypts data after stealing sensitive information, negotiating ransom rather than paying a fixed bitcoin amount. It combines data theft, encryption, and multiple defense-evading and persistence …

Read More
Threat Research

Cyble – The Many Faces Of Qakbot Malware: A Look At Its Diverse Distribution Methods

February 17, 2023October 16, 2025 Securonix

Qakbot (QBot) is spread through multiple OneNote- and script-based channels, including OneNote attachments, WSF/JS/JSE/HTA paths, and HTML applications, each delivering a DLL payload that is executed via Rundll32 and often injected into processes. The campaign…

Read More
Threat Research

Royal Ransomware Expands Attacks by Targeting Linux ESXi Servers

February 17, 2023October 13, 2025 Securonix

Royal ransomware has expanded its targets to Linux-based ESXi servers, introducing a Linux variant that encrypts files on virtualization hosts. The analysis outlines how the Linux variant uses ESXi tooling and traditional encryption (AES/RSA) to disrupt data c…

Read More
Threat Research

WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks

February 16, 2023October 14, 2025 SentinelOne

A new threat cluster has been targeting telecommunication providers in the Middle East and abusing Microsoft, Google and Dropbox cloud services.

Read More
Threat Research

Cyble – Decoding The Inner Workings Of DarkCloud Stealer

February 16, 2023October 13, 2025 Securonix

DarkCloud Stealer is a multi-stage information-stealer that can exfiltrate data via SMTP, Telegram, Web Panel, and FTP, and is distributed through spam campaigns with a customizable builder for grabber and clipper features. Researchers observed a rise in DarkC…

Read More
Threat Research

Your Office Document is at Risk – XLL, A New Attack Vector

February 16, 2023October 16, 2025 Securonix

Two office-document threat vectors are described: attackers are moving from VBA macros to malicious Microsoft Office Add-ins, specifically XLLs, to deliver payloads. The article details a Raccoon Stealer V2 campaign that uses obfuscated .NET installers loaded …

Read More
Threat Research

Hydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia

February 16, 2023October 16, 2025 Securonix

Hydrochasma targets medical laboratories and shipping organizations in Asia in an intelligence-gathering campaign that relies on publicly available tools and living-off-the-land techniques. The operation, active since October 2022, appears focused on informati…

Read More
Threat Research

eSentire Threat Intelligence Malware Analysis: Icarus Stealer

February 16, 2023October 15, 2025 Securonix

First introduced in July 2022, Icarus Stealer is an infostealer that uses an hVNC capability to create a hidden desktop for covert navigation on infected machines. It packs a wide range of features (2FA bypass, rootkit, macros, VBS payloads, CCleaner, Bot Kill…

Read More
Threat Research

ESXiArgs Ransomware Campaign Targets VMWare ESXi Vulnerability

February 16, 2023October 15, 2025 Securonix

Security researchers warn of a widespread ESXiArgs ransomware campaign exploiting CVE-2021-21974 in VMware ESXi, with warnings issued starting February 3. SecurityScorecard’s STRIKE and ASI analyses reveal affected ESXi versions and IPs involved in potential e…

Read More
Threat Research

RedLine Stealer returns with New TTPS – Detection & Response – Security Investigation

February 16, 2023October 13, 2025 Securonix

Redline Stealer has re-emerged with new TTPS-detection findings, detailing its infection chain, data-theft capabilities, and persistence mechanisms. The article outlines how the malware spreads, what data it targets, and the indicators that security teams can …

Read More
Threat Research

Ransomware Roundup – CatB | FortiGuard Labs

February 15, 2023October 15, 2025 Securonix

FortiGuard Labs’ ransomware roundup analyzes CatB, detailing its Windows-focused dropper, DLL sideloading, anti-analysis checks, and a high ransom demand. It also covers infection methods, payload behavior, and Fortinet protections and guidance. #CatB #FortiGu…

Read More
Threat Research

BlackCat Ransomware Group Claims Attack on Healthcare Service Provider

February 15, 2023October 13, 2025 Securonix

Security researchers report that the BlackCat ransomware group briefly claimed an attack on a major U.S. electronic health record (EHR) vendor, but the entry disappeared within days. STRIKE analysis links possible BlackCat activity to its ExMatter/Fendr exfilt…

Read More
Threat Research

Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon

February 15, 2023October 14, 2025 Securonix

EclecticIQ analyzes three cases of cyberattacks likely linked to the Gamaredon APT group, targeting the Security Service of Ukraine, Culver Aviation, and Latvian/NATO allies with phishing, HTML smuggling, and CVE-2017-0199 Word exploits. The report notes overl…

Read More

Posts pagination

Previous 1 … 427 428 429 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.