Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Abraham’s Ax Likely Linked to Moses Staff

January 26, 2023October 18, 2025 Securonix

Secureworks CTU researchers link Moses Staff and Abraham’s Ax as likely the same operator tied to COBALT SAPLING, based on similarities in iconography, videos, and leak-site infrastructure. The groups share multilingual WordPress leak sites, near-identical bra…

Read More
Threat Research

Resecurity | Nevada Ransomware – Waiting For The Next Dark Web Jackpot

January 26, 2023October 14, 2025 Securonix

Resecurity identifies Nevada Ransomware as a relatively new ransomware family with an active affiliate platform on the RAMP underground. It operates a Windows and Linux/ESXi locker, supports post-exploitation workflows, and uses a TOR-based affiliate portal to…

Read More
Threat Research

Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware – Check Point Research

January 26, 2023October 22, 2025 Securonix

TrickGate is a transformative, shellcode-based packer-as-a-service used to conceal malware from security tools since 2016 and has wrapped a wide range of threats including Cerber, Trickbot, Maze, and Emotet. The packer’s core building blocks—shellcode loader, …

Read More
Threat Research

BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino Malware | Recorded Future

January 26, 2023October 13, 2025 Securonix

BlueBravo is a threat group linked to Russian APT activity (AP T29/NOBELIUM and SVR) and deployed GraphicalNeutrino via a compromised site lure themed around ambassadors. It also increasingly uses legitimate Western services like Notion for C2 to blend malware…

Read More
Threat Research

ASEC Weekly Malware Statistics (January 16th, 2023 – January 22nd, 2023) – ASEC BLOG

January 26, 2023October 13, 2025 Securonix

Infostealer was the leading malware category in the Jan 16–22, 2023 period, accounting for 43.0% of samples, followed by downloader (30.06%) and backdoor (19.9%). The report highlights BeamWinHTTP, AgentTesla, Formbook, SmokeLoader, and Pony as top families, w…

Read More
Threat Research

Ransomware Spotlight: Magniber – Security News

January 26, 2023October 14, 2025 Securonix

Magniber is a ransomware family that exploits a wide range of public-facing vulnerabilities and uses layered execution, evasion, and delivery techniques to encrypt targeted files. It also employs typosquatting, fake installers, and signature bypass methods to …

Read More
Threat Research

Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations

January 25, 2023October 13, 2025 Securonix

The article explains how to reconstruct Gootloader registry payloads using off-host Python scripts and CyberChef workflows, as well as on-host PowerShell decoding. It also catalogs technical indicators, network signals, and YARA rules related to GOOTLOADER, FO…

Read More
Threat Research

Unmasking VENOM SPIDER

January 24, 2023October 14, 2025 Securonix

Security researchers at eSentire TRU unravel the operator behind Golden Chickens—badbullzvenom—connected to VENOM SPIDER, with links to FIN6, Cobalt Group, and Evilnum. The report details the malware’s modular components, evolving campaigns, and defense recomm…

Read More
Threat Research

Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats

January 24, 2023October 14, 2025 Securonix

Realtek CVE-2021-35394 exploitation surged in 2022, with tens of millions of attempts targeting the Realtek Jungle SDK remote code execution vulnerability and a significant shift to delivering IoT malware. The campaign affected hundreds of device models across…

Read More
Threat Research

ASEC Weekly Phishing Email Threat Trends (January 8th, 2023 – January 14th, 2023) – ASEC BLOG

January 23, 2023October 15, 2025 Securonix

ASEC’s weekly briefing analyzes phishing email threats from January 8–14, 2023, highlighting attachments as the main delivery method for Infostealer, FakePage, and other malware families, including OneNote (.ONE) extensions. It also outlines case distributions…

Read More
Threat Research

GuLoader: The NSIS Vantage Point

January 20, 2023October 16, 2025 Securonix

GuLoader is an advanced shellcode downloader that uses anti-analysis tricks to evade detection and hinder reverse engineering, and its campaign remains ongoing through 2022. Trellix observed threat actors increasingly delivering GuLoader via NSIS-based install…

Read More
Threat Research

Job scams impersonate companies still hiring following tech layoffs

January 20, 2023October 15, 2025 Securonix

Two sentences summarizing the content: Scammers impersonate recruiters to target job seekers amid tech layoffs, using fake postings, portals, and forms to harvest personal data and potentially extort victims. The campaign relies on newly registered domains, co…

Read More
Threat Research

Protecting Against Malicious Use of Remote Monitoring and Management Software | CISA

January 20, 2023October 16, 2025 Securonix

Two agencies warn defenders about the malicious use of legitimate remote monitoring and management (RMM) software, showing how attackers abused tools like ScreenConnect (ConnectWise Control) and AnyDesk via phishing to steal funds and gain backdoor access. The…

Read More
Threat Research

Cyble – Titan Stealer: The Growing Use Of GoLang Among Threat Actors

January 20, 2023October 18, 2025 Securonix

Threat actors are increasingly using Go (Golang) to develop cross‑platform information stealers, with Titan Stealer highlighted as a recent example. The article covers Titan Stealer’s Go-based builder, its C2 infrastructure and dashboards, the data it collects…

Read More
Threat Research

New Mimic Ransomware Abuses Everything APIs for its Encryption Process

January 20, 2023October 16, 2025 Securonix

Trend Micro researchers uncovered Mimic, a new ransomware that leverages the Everything tool’s APIs to locate files for encryption and operates with multiple defense-evading capabilities. The malware appears linked to Conti-inspired tooling and dropped compone…

Read More

Posts pagination

Previous 1 … 432 433 434 … 490 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.