Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Earth Bogle: Campaigns Target the Middle East with Geopolitical Lures

January 11, 2023October 14, 2025 Securonix

Trend Micro details an active Earth Bogle campaign targeting the Middle East and North Africa that uses geopolitical-themed lures to distribute NjRAT (Bladabindi). Attackers host payloads on public cloud storage and compromised web servers, distributing them v…

Read More
Threat Research

Gotta Catch ‘Em All | Understanding the NetSupport RAT Campaigns Hiding Behind Pokemon Lures

January 11, 2023October 14, 2025 Securonix

Researchers report a NetSupport RAT campaign that uses a Pokemon-themed lure to trick targets into installing a trojanized NetSupport RAT client, granting attackers full control of the compromised device. The operation relies on ISO droppers masquerading as le…

Read More
Threat Research

ASEC Weekly Phishing Email Threat Trends (January 1st, 2023 – January 7th, 2023) – ASEC BLOG

January 11, 2023October 15, 2025 Securonix

ASEC’s weekly phishing threat analysis for Jan 1–7, 2023 shows phishing email attachments as the dominant attack vector, with FakePage pages designed to harvest credentials, followed by Worm, Infostealer, and Downloader campaigns. The report also highlights MO…

Read More
Threat Research

Decrypted: BianLian Ransomware – Avast Threat Labs

January 10, 2023October 18, 2025 Securonix

Avast has released a decryptor for the BianLian ransomware, making it publicly available to help victims recover encrypted files. The article outlines BianLian’s Go-based ransomware behavior, its AES-256-CBC encryption, and how to use Avast’s decryptor to rest…

Read More
Threat Research

Cyble – Rhadamanthys: New Stealer Spreading Through Google Ads

January 10, 2023October 13, 2025 Securonix

Rhadamanthys Stealer is a MaaS-delivered infostealer that spreads via Google Ads and phishing sites impersonating legitimate apps, extracting browser data, crypto-wallet details, and system information. Cyble researchers describe its delivery chain from spam, …

Read More
Threat Research

PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources

January 10, 2023October 14, 2025 Securonix

Unit 42 researchers examine Automated Libra, the cloud threat actor behind PurpleUrchin, which freejacks cloud resources to mine cryptocurrency. They reveal CI/CD automation, massive GitHub and cloud account creation, CAPTCHA exploitation, and a Play and Run t…

Read More
Threat Research

Gootloader Malware Leads to Cobalt Strike and Hand-on-Keyboard…

January 10, 2023October 17, 2025 Securonix

TRU investigators at eSentire uncovered Gootloader using a new infection technique delivered via a compromised WordPress site, followed by a hands-on-keyboard phase with Cobalt Strike. The analysis tracks BloodHound usage, PsExec lateral movement, and PowerShe…

Read More
Threat Research

Malicious JARs and Polyglot files: “Who do you think you JAR?” | Deep Instinct

January 10, 2023October 13, 2025 Securonix

Deep Instinct details 2022 observations of polyglot files that combine malicious JARs with other formats to evade detection, focusing on MSI+JAR, CAB+JAR, and other appended variants tied to StrRAT and Ratty. The article also covers detection challenges, commu…

Read More
Threat Research

Analysis of FG-IR-22-398 – FortiOS – heap-based buffer overflow in SSLVPNd | Fortinet Blog

January 10, 2023October 13, 2025 Securonix

Fortinet’s analysis details a targeted FortiOS SSL-VPN heap overflow (CVE-2022-42475) used to deploy a Linux implant masquerading as an IPS component. The write-up covers malware behavior, IoCs, C2 infrastructure, affected FortiGate models/versions, and recomm…

Read More
Threat Research

QakBot Malware Bypass Windows Security Using Unpatched Vulnerability

January 10, 2023October 15, 2025 Securonix

EclecticIQ details a QakBot phishing campaign that bypasses Windows Mark of the Web (MoTW) using an unpatched vulnerability, enabling malware installation. The campaign leverages LOLBINS like Regsvr32 and WScript, delivers payloads via encrypted ZIP/ISO, and c…

Read More
Threat Research

Orcus RAT Being Distributed Disguised as a Hangul Word Processor Crack – ASEC BLOG

January 10, 2023October 13, 2025 Securonix

Orcus RAT is being distributed on file-sharing sites disguised as a cracked Hangul Word Processor, linked to the same actor who previously pushed BitRAT and XMRig under a Windows license verifier guise. The campaign employs a multi-stage delivery chain with ob…

Read More
Threat Research

Automating Malware Analysis Operations (MAOps) – JPCERT/CC Eyes

January 10, 2023October 13, 2025 admin

JPCERT/CC describes cloud-based malware analysis operations (MAOps) that automate C2 monitoring, malware hunting, YARA rule generation, surface analysis, and memory forensics using AWS serverless services and GitHub workflows. The article showcases several cas…

Read More
Threat Research

Holiday Attack Spikes Target Ancient Vulnerabilities and Hidden Webshells

January 9, 2023October 15, 2025 Securonix

Holiday season spikes in attack attempts were driven by reduced monitoring, with two notable waves targeting the Downloads Manager plugin. The findings emphasize removing outdated plugins, keeping WordPress components updated, and relying on firewall protectio…

Read More
Threat Research

HIVE Ransomware Attack Research & Analysis | Rapid7 Blog

January 9, 2023October 16, 2025 Securonix

Rapid7 details how threat actors deploy Hive ransomware with a mix of known techniques and new methods to drop defenses, enable lateral movement, and encrypt across victim machines and network shares. The article also covers new Hive flags (-timer, -low-key) a…

Read More
Threat Research

Ransomware Roundup – Monti, BlackHunt, and Putin | FortiGuard Labs

January 9, 2023October 15, 2025 Securonix

FortiGuard Labs’ Ransomware Roundup analyzes Monti, BlackHunt, and Putin ransomware, detailing distinct methods from Linux file encryption to RDP-driven intrusions and data-leak strategies. The piece also outlines Fortinet protections and defense recommendatio…

Read More

Posts pagination

Previous 1 … 435 436 437 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.