Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

WordPress sites backdoored with ad fraud plugin

February 15, 2023October 15, 2025 Securonix

A WordPress ad-fraud operation abuses a backdoored plugin named fuser-master to turn dozens of blogs into fraud machines that load and refresh ads via a hidden popunder flow triggered by a special entrypoint URL. The plugin simulates human browsing (scrolling,…

Read More
Threat Research

Hunting Cyber Evil Ratels: From the targeted attacks to the widespread usage of Brute Ratel – Yoroi

February 14, 2023October 21, 2025 Securonix

Brute Ratel, a Red Team framework, has been abused by attackers including APT29 to conduct cyber intrusions, with methods such as ISO-delivered LNK files used for DLL sideloading of version.dll. The article also details the framework’s technical underpinnings,…

Read More
Threat Research

Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack

February 14, 2023October 14, 2025 Securonix

Trend Micro researchers attribute a new backdoor to the Earth Kitsune threat group, delivered via a watering hole operation and social engineering. The campaign blends patched installers, Chrome native messaging persistence, ECC-based cryptography for C2, and …

Read More
Threat Research

DarkBit Ransomware Targets Israel with Command-Line Options and Optimized Encryption Routines

February 13, 2023October 15, 2025 Securonix

DarkBit is a new ransomware strain that targeted Technion in Israel, encrypting files and demanding a Bitcoin ransom. The group uses a branded onion site and social media to publicize the attack and promote geopolitical messaging. #DarkBit #Technion #Onion #To…

Read More
Threat Research

Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns

February 13, 2023October 16, 2025 Securonix

Earth Yako is an intrusion set linked to Operation RestyLink/EneLink, with newly observed TTPs and infrastructure for cyberespionage against Japanese researchers and think tanks (also some Taiwan targets). The campaign features multiple malware families (Mirro…

Read More
Threat Research

Recent TZW Campaigns Revealed As Part of GlobeImposter Malware Family

February 13, 2023October 13, 2025 Securonix

Two sentences summarizing the content: GlobeImposter has spanned multiple campaigns and rebrands, with the TZW ransomware identified as a new variant that shares infrastructure and techniques with GlobeImposter. The findings show shared onion-based victim port…

Read More
Threat Research

스테가노그래피 기법 사용한 한글(HWP) 악성코드 : RedEyes(ScarCruft) – ASEC BLOG

February 12, 2023October 15, 2025 Securonix

ASEC analyzed RedEyes (ScarCruft/APT37) activity in Korea, revealing the group’s use of the Hangul EPS vulnerability CVE-2017-8291 to spread malware via steganography and a new M2RAT backdoor that employs shared memory for C2. The operation combines persistenc…

Read More
Threat Research

Global ESXiArgs ransomware attack on the back of a two-year-old vulnerability

February 10, 2023October 14, 2025 Securonix

The ESXiArgs ransomware campaign exploited CVE-2021-21974 via the OpenSLP service to remotely execute code on exposed ESXi servers. VMware patched the vulnerability in early 2021, while Trellix details how attackers probe the internet for unpatched systems, en…

Read More
Threat Research

ProxyShellMiner Campaign Creating Dangerous Backdoors

February 10, 2023October 20, 2025 Securonix

Morphisec identifies a highly evasive ProxyShellMiner campaign that leverages ProxyShell flaws to gain access to Windows Exchange servers and deploys a multi-stage coin-mining operation across an organization. The campaign uses domain-wide persistence, obfusca…

Read More
Threat Research

Cyble – Uncovering The Dark Side Of DarkBit Ransomware

February 9, 2023October 16, 2025 Securonix

DarkBit ransomware targeted a large Israeli university with politically motivated aims, and Cyble Research and Intelligence Labs analyzed its Go-based binary, encryption behavior, and public messaging around motives. The attackers’ ransom note, Twitter bio, an…

Read More
Threat Research

Paradise Ransomware Distributed Through AweSun Vulnerability Exploitation – ASEC BLOG

February 9, 2023October 13, 2025 Securonix

Paradise ransomware is being distributed via exploitation of the AweSun vulnerability, with the same actors previously linked to Sunlogin-related BYOVD and Sliver C2 campaigns. The attackers use AweSun-generated cmd/PowerShell to install DP_Main.exe, encrypt f…

Read More
Threat Research

Mirai Variant V3G4 Targets IoT Devices

February 9, 2023October 15, 2025 Securonix

Mirai variant V3G4 emerged in 2022, leveraging numerous vulnerabilities to propagate across Linux-based IoT devices and convert them into a botnet capable of DDoS and other attacks. It uses hardcoded C2 domains, XOR-based decryption, string encryption, and a s…

Read More
Threat Research

Havoc Across the Cyberspace

February 9, 2023October 13, 2025 Securonix

Zscaler ThreatLabz researchers analyzed a government-targeting campaign that uses Havoc, an open-source post-exploitation C2 framework, to blend evasive techniques with multi-stage delivery and execution. The operation leverages a downloader chain, a signed sh…

Read More
Threat Research

Ransomware Attack Against U.S. Public Housing Authority Linked to Previous Attacks

February 9, 2023October 25, 2025 Securonix

SecurityScorecard’s STRIKE Team investigates a ransomware incident affecting a major U.S. city housing authority and concludes with moderate confidence that the event involved ransomware, despite past false claims by LockBit. The analysis ties activity to a kn…

Read More
Threat Research

Technical Advisory: Immediately Patch Your VMware ESXi Servers Targeted by Opportunistic Threat Actors

February 8, 2023October 13, 2025 Securonix

Bitdefender researchers describe opportunistic threat actors abusing CVE-2021-21974 to target VMware ESXi, leveraging OpenSLP (port 427) for pre-auth remote code execution and deploying ESXiArgs ransomware against VM files. The advisory covers attack patterns,…

Read More

Posts pagination

Previous 1 … 428 429 430 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.