Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Cyble – Increase In Fake Donation Schemes Following Massive Earthquake In Turkey

February 8, 2023October 18, 2025 Securonix

Cyble Research & Intelligence Labs (CRIL) highlights a spike in fake donation schemes exploiting the Turkey–Syria earthquake, where scammers impersonate charities to harvest personal data and funds. The attackers host phishing sites, redirect victims to legiti…

Read More
Threat Research

Mylobot: Investigating a proxy botnet | Bitsight

February 8, 2023October 18, 2025 Securonix

Bitsight profiles Mylobot, a proxy botnet that turns infected hosts into proxies controlled by a C2, with a downloader that expands the network via WillExec and links to BHProxies. The operation features extensive hardcoded and encrypted domain lists, large DN…

Read More
Threat Research

Investigating Intrusions From Intriguing Exploits

February 7, 2023October 16, 2025 Securonix

Huntress linked a February 2023 GoAnywhere MFT-related intrusion to a zero-day vulnerability and a Truebot-like post-exploitation activity, leading to a mitigation before a ransomware event could unfold. The effort highlighted how certutil and rundll32 were us…

Read More
Threat Research

Web Page Disguised as a Naver Login Page – ASEC BLOG

February 7, 2023November 8, 2025 Securonix

ASEC reports that attackers are leveraging a Gnuboard 4-based site to host fake Kakao and Naver login pages aimed at credential theft. Attribution points to the Kimsuky group, noting deceptive links and autocompletion behavior designed to trap users. #Kimsuky …

Read More
Threat Research

Dalbit (m00nlight): Chinese Hacker Group’s APT Attack Campaign – ASEC BLOG

February 7, 2023October 16, 2025 Securonix

Dalbit (Moonlight) is a threat group tracked by AhnLab’s ASEC, which has conducted 50+ attacks against Korean companies since 2022 using open-source tools, WebShells, and proxy-based C2 infrastructure through *.m00nlight.top. The operation progresses from init…

Read More
Threat Research

Open-source repository malware sows Havoc

February 7, 2023October 16, 2025 Securonix

ReversingLabs identified aabquerys, a malicious npm package that downloads second and third stage malware payloads to systems that have downloaded and run the npm package. This incident highlights growing open source supply chain risks in npm, PyPi, and GitHub…

Read More
Threat Research

AsyncRAT Being Distributed as Windows Help File (*.chm) – ASEC BLOG

February 7, 2023October 15, 2025 Securonix

AsyncRAT is being distributed through Windows CHM (CHM) files, with a multi-stage chain that downloads and executes payloads via mshta, VBScript, and HTA. The campaign culminates in a fileless AsyncRAT deployment featuring anti-VM, keylogging, and screenshot c…

Read More
Threat Research

Cloud Credentials Phishing | Malicious Google Ads Target AWS Logins

February 6, 2023October 13, 2025 Securonix

Malicious Google Ads were used to promote AWS credential phishing pages, delivered through a multi-hop redirection chain that ends at a legitimate AWS login page. The operation includes a proxy Blogspot page, anti-analysis JavaScript, and Brazil-linked infrast…

Read More
Threat Research

HTML Smuggling: The Hidden Threat in Your Inbox | Trustwave

February 6, 2023October 17, 2025 Securonix

HTML smuggling is a rising method used by criminals to deliver malware via HTML attachments and archives masquerading as legitimate brands. The Trustwave SpiderLabs piece catalogs campaigns by Qakbot, IcedID, Cobalt Strike, and Xworm that abuse HTML smuggling …

Read More
Threat Research

#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities | CISA

February 6, 2023October 15, 2025 Securonix

The advisory outlines ongoing DPRK state-sponsored ransomware activity targeting Healthcare and Public Health Sector organizations and other critical infrastructure, detailing TTPs, IOCs, and cryptocurrency ransom payments. It also describes how actors acquire…

Read More
Threat Research

NewsPenguin, a Previously Unknown Threat Actor, Targets Pakistan with Advanced Espionage Tool

February 5, 2023October 14, 2025 Securonix

NewsPenguin, a previously unknown threat actor, targeted organizations in Pakistan using spear-phishing tied to the Pakistan International Maritime Expo & Conference (PIMEC-2023) and delivered a multi-stage payload. The final espionage tool is XOR-encrypted wi…

Read More
Threat Research

Quasar RAT Being Distributed by Private HTS Program – ASEC BLOG

February 4, 2023October 14, 2025 Securonix

ASEC’s analysis reveals Quasar RAT being distributed via a private Home Trading System (HTS) called HPlus, used by illicit investment groups to lure victims and install malware. The campaign shows HTS masquerading as legitimate investment services, delivering …

Read More
Threat Research

Analysis of ESXiArgs Ransomware | SECUINFRA

February 4, 2023October 13, 2025 Securonix

ESXiArgs is a ransomware variant that targeted exposed ESXi hypervisors by exploiting CVE-2021-21974 via OpenSLP to deploy a Python-based backdoor and a web shell. The campaign encrypts virtual machine data using RSA and Sosemanuk, overwrites ransom notes on t…

Read More
Threat Research

Cl0p Ransomware Targets Linux Systems with Flawed Encryption | Decryptor Available

February 3, 2023October 18, 2025 Securonix

SentinelLabs documented the first Linux ELF variant of Cl0p ransomware, which includes a flawed encryption routine that can decrypt files without paying. A free decryptor for this Linux variant was released by SentinelLabs. Hashtags: #Cl0p #Cl0pELF #Linux #Sen…

Read More
Threat Research

TA866 Threat Actor: WasabiSeed & Screenshotter Malware | Proofpoint US

February 2, 2023October 16, 2025 Securonix

Proofpoint tracks a new financially motivated threat actor cluster, TA866, linked to the Screentime activity that uses custom tools WasabiSeed and Screenshotter to gather victim information via screenshots before deploying additional payloads. The operation le…

Read More

Posts pagination

Previous 1 … 429 430 431 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.