Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Clearing the Air: Overblown Claims of Vulnerabilities, Exploits & Severity

January 17, 2023October 15, 2025 Securonix

Huntress shares their take on the ConnectWise Control vulnerability discussions, arguing there was no demonstrated exploit at the severity level claimed and advocating for responsible disclosure and collaboration. They emphasize social engineering and phishing…

Read More
Threat Research

Ransomware Diaries: Volume 1 | Analyst1

January 17, 2023October 17, 2025 Securonix

Analyst1 presents a human-centric examination of the LockBit operation, tracing its evolution from ABCD to LockBit Red/Black and detailing the personalities, inter-gang dynamics, and operational innovations behind one of the world’s most prolific ransomware or…

Read More
Threat Research

Darth Vidar: Evolution of Threat Infrastructure at Team Cymru

January 15, 2023October 16, 2025 Securonix

Team Cymru analyzes Vidar’s evolving threat infrastructure, highlighting domain shifts, proxy configurations, and anonymization methods (including Tor and Hola VPN) that complicate analysis. The post also covers a two-tier management architecture, payload upda…

Read More
Threat Research

ASEC Weekly Malware Statistics (January 9th, 2023 – January 15th, 2023) – ASEC BLOG

January 14, 2023October 16, 2025 Securonix

ASEC analyzed weekly malware statistics for Jan 9–15, 2023 using RAPIT, highlighting downloader as the top category followed by Infostealer. The report details the leading families SmokeLoader, BeamWinHTTP, Formbook, AgentTesla, and Lokibot and their C2 infras…

Read More
Threat Research

Ransomware Roundup – Playing Whack-a-Mole with New CrySIS/Dharma Variants | FortiGuard Labs

January 13, 2023October 15, 2025 Securonix

FortiGuard Labs’ ransomware roundup analyzes CrySIS/Dharma variants and their ongoing evolution, highlighting how new versions continue to appear under different operators. It outlines infection vectors (exposed RDP and phishing), execution details (startup pe…

Read More
Threat Research

Following the LNK metadata trail

January 13, 2023October 15, 2025 Securonix

Cisco Talos analyzed LNK file metadata to track threat actors like Qakbot, Gamaredon, Bumblebee, and IcedID, showing how metadata can reveal campaign connections. As macros were blocked and actors shifted to LNK-based attachments, the article demonstrates how …

Read More
Threat Research

Web skimmer found on website of Liquor Control Board of Ontario

January 13, 2023November 8, 2025 Securonix

The LCBO disclosed a cybersecurity incident in January 2023 involving a web skimmer designed to steal customer payment information from LCBO.com during checkout. Experts identified the skimmer as Magecart, loaded via a Base64-encoded Google Tag Manager snippet…

Read More
Threat Research

Breaking Down the SEO Poisoning Attack | How Attackers Are Hijacking Search Results

January 13, 2023October 15, 2025 Securonix

SEO poisoning campaigns are increasingly used to serve malvertising and deliver commodity malware via manipulated search results, demonstrated by a Blender 3D example where malicious ads appear at the top before the legitimate site. Attackers rotate domains an…

Read More
Threat Research

Batloader Malware Abuses Legitimate Tools Uses Obfuscated JavaScript Files in Q4 2022 Attacks

January 13, 2023October 14, 2025 Securonix

This report analyzes Batloader campaigns observed in Q4 2022 linked to the Water Minyades intrusion set, highlighting its use of obfuscated JavaScript, MSI/JS payloads, and abuse of legitimate tools to evade defenses. It details how Batloader can drop multiple…

Read More
Threat Research

Chinese Playful Taurus Activity in Iran

January 12, 2023October 15, 2025 Securonix

Playful Taurus (APT15) continues to evolve its toolkit, upgrading the Turian backdoor and expanding C2 infrastructure, with Iranian government networks likely compromised. The investigation maps infrastructure ties, updated variants, and supporting artifacts l…

Read More
Threat Research

VagusRAT: A New Entrant in the External Threat Landscape – CYFIRMA

January 12, 2023October 16, 2025 Securonix

VagusRAT is a new remote access tool delivered through Google Ads campaigns that abuse typosquatting and SEO poisoning to lure users into downloading malicious apps. CYFIRMA attributes VagusRAT to Iranian actors, notes its Malware-as-a-Service model, and highl…

Read More
Threat Research

Malicious Google Ad –> Fake Notepad++ Page –> Aurora Stealer malware

January 12, 2023October 31, 2025 Securonix

Attackers use Google ads to lure users to fake Notepad++ download pages that install Aurora Stealer. The article traces the infection chain from the ad-driven page to the downloaded malware and its post-infection C2 traffic, and lists the associated IOCs.

Read More
Threat Research

Raspberry Robin’s botnet second life

January 12, 2023October 17, 2025 Securonix

Raspberry Robin is a Pay-Per-Install botnet that spreads via infected USB drives by launching an LNK file to download its MSI payload from compromised QNAP NAS, enabling distribution of other malware and hands-on-keyboard ransomware. The infrastructure is dyna…

Read More
Threat Research

Malicious Office Macros: Detecting Similarity in the Wild | Perception Point

January 12, 2023October 17, 2025 Securonix

Attackers rely on Office macros and transformation toolkits to preserve malicious behavior while changing signatures, making similarity detection essential for modern defenses. The article showcases real-world similarity patterns in macro malware (identifier s…

Read More
Threat Research

Phishing Web Server Identified Through an Impostor National Tax Service Email – ASEC BLOG

January 12, 2023October 14, 2025 Securonix

ASEC researchers uncovered a phishing campaign impersonating the National Tax Service, urging recipients to extend their password duration with an on-message about password expiry. The campaign uses a fake login site to harvest credentials, IPs, and personal d…

Read More

Posts pagination

Previous 1 … 434 435 436 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.