Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

MalVirt | .NET Virtualization Thrives in Malvertising Attacks

January 31, 2023October 17, 2025 Securonix

SentinelLabs detected a cluster of virtualized .NET loaders, named MalVirt, distributed via malvertising to deliver Formbook/XLoader infostealer payloads. The loaders use KoiVM-based virtualization and anti-analysis techniques, rely on a Windows Process Explor…

Read More
Threat Research

Cyble – Qakbot’s Evolution Continues With New Strategies

January 31, 2023October 15, 2025 Securonix

Threat actors are increasingly using OneNote attachments in spam campaigns to deliver Qakbot and other malware families. The infection chain drops an HTA loader via mshta, downloads a Qakbot DLL, and then executes it, enabling credential theft and lateral move…

Read More
Threat Research

Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware

January 30, 2023October 15, 2025 Securonix

EclecticIQ details Mustang Panda’s campaign against government and public-sector targets in Asia and Europe, delivering a modified PlugX variant via malicious ISO images embedded with LNK shortcuts and employing DLL hijacking, in-memory loading, and a multi-st…

Read More
Threat Research

Malicious LNK File Disguised as a Normal HWP Document – ASEC BLOG

January 30, 2023October 15, 2025 Securonix

An ASEC analysis uncovers a malicious LNK file disguised as a normal HWP document, bundled with a text file impersonating the National Tax Service. The attack chain uses PowerShell to run payloads, iterates through multiple VBScript/Batch components, and exfil…

Read More
Threat Research

New APT34 Malware Targets The Middle East

January 30, 2023October 16, 2025 Securonix

Trend Micro analyzes a December 2022 campaign attributed to APT34, deploying a new .NET backdoor (MrPerfectInstaller) to steal credentials and exfiltrate data via compromised mailbox accounts. The attackers leverage Microsoft Exchange Web Services to relay sto…

Read More
Threat Research

HeadCrab: A Novel State-of-the-Art Redis Malware

January 30, 2023October 16, 2025 Aquasec

HeadCrab is a novel, memory-resident Redis malware that has quietly compromised Redis servers worldwide since 2021, forming a botnet of at least 1,200 servers. It loads a custom Redis module via SLAVEOF/master replication, operates entirely in memory to evade …

Read More
Threat Research

The Rising Threat of OneNote Malware | Proofpoint US

January 28, 2023October 16, 2025 Securonix

Proofpoint researchers report a rising trend of malware delivery via OneNote attachments in email campaigns from December 2022 to January 2023, spanning multiple threat actors and broad targets. End users must interact with embedded OneNote content to execute …

Read More
Threat Research

Attack Cases of CoinMiners Mining Ethereum Classic Coins – ASEC BLOG

January 27, 2023October 17, 2025 Securonix

The ASEC analysis tracks CoinMiners targeting Korean and overseas users, detailing cases of Ethereum Classic mining and related tooling. It covers distribution methods (Discord, dnSpy disguises), involved malware families, wallet addresses, and the broader tre…

Read More
Threat Research

Machine Learning Versus Memory Resident Evil

January 27, 2023October 16, 2025 Securonix

Unit 42 researchers describe a machine learning pipeline that analyzes memory-based artifacts from a hypervisor-based sandbox to detect evasive malware like GuLoader. The article discusses limitations of static and sandbox analysis and demonstrates how memory-…

Read More
Threat Research

Rapid7 observes use of Microsoft OneNote to spread Redline Infostealer | Rapid7 Blog

January 27, 2023October 13, 2025 Securonix

Rapid7 observed attackers using Microsoft OneNote to deliver base64-encoded payloads that decrypt to Redline Infostealer or AsyncRat, via a multi-stage chain starting with a phishing OneNote attachment. The analysis details how a hidden batch script launches a…

Read More
Threat Research

Cyble – Vector Stealer: A Gateway For RDP Hijacking

January 27, 2023October 13, 2025 Securonix

VectorStealer is an information-stealer capable of harvesting data from browsers, chat apps, and .rdp session files, enabling threat actors to perform RDP hijacking and remote access. It is sold via a web panel and Telegram channel, uses the KGB Crypter and Ko…

Read More
Threat Research

Fresh Phish: Southwest’s Flying Phish Takes Off With Your Credentials

January 27, 2023October 13, 2025 Securonix

INKY uncovered a widespread Southwest Airlines credential harvesting phishing campaign that uses newly created domains to lure victims via a fake survey and gift-card offer. The scam escalates from impersonation and enticing branding to a credential-harvesting…

Read More
Threat Research

IcedID Malware Shifts Its Delivery Strategy

January 27, 2023October 17, 2025 Securonix

IcedID has shifted from email-based delivery to drive-by infections delivered via Google Search Ads that target common enterprise applications. The TRU team explains how ads, cloaking, and a Cobalt Strike foothold are used to compromise endpoints and deliver I…

Read More
Threat Research

Ransomware Spotlight: Magniber – Security News

January 26, 2023October 14, 2025 Securonix

Magniber is a ransomware family that exploits a wide range of public-facing vulnerabilities and uses layered execution, evasion, and delivery techniques to encrypt targeted files. It also employs typosquatting, fake installers, and signature bypass methods to …

Read More
Threat Research

Analyzing Malware Code that Cryptojacks System to Mine for Monero Crypto | FortiGuard Labs

January 26, 2023October 15, 2025 Securonix

FortiGuard Labs tracked a campaign using malicious Excel VBA macros (OLE Compound File) to cryptojack Windows systems for Monero. The attackers deliver a .NET payload, load a miner via process hollowing, and maintain persistence through Task Scheduler while ex…

Read More

Posts pagination

Previous 1 … 431 432 433 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.