Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Gootkit Loader Actively Targets Australian Healthcare Industry

January 6, 2023October 16, 2025 Securonix

Trend Micro analyzes Gootkit loader’s infection routine targeting Australian healthcare, showing SEO poisoning for initial access and abuse of VLC Media Player for DLL sideloading and Cobalt Strike usage. The campaign features obfuscated JavaScript, fake WordP…

Read More
Threat Research

SCATTERED SPIDER Attempts to Avoid Detection with Bring-Your-Own-Driver Tactic

January 5, 2023October 15, 2025 Securonix

SCATTERED SPIDER attempted a Bring-Your-Own-Vulnerable-Driver (BYOVD) operation to load a kernel driver via CVE-2015-2291 in the Intel Ethernet Diagnostics driver (iqvw64.sys) to gain kernel access and persistence. CrowdStrike detected and blocked the attempt,…

Read More
Threat Research

THREAT ANALYSIS: From IcedID to Domain Compromise

January 5, 2023October 14, 2025 Securonix

Cybereason’s Threat Analysis chronicles an IcedID (BokBot) campaign, detailing its use as a dropper and initial access tool, TTPs, and post-compromise activity across a Windows environment. The report notes a shift to ISO/LNK infection vectors, cross-group tec…

Read More
Threat Research

ASEC Weekly Phishing Email Threat Trends (December 18th, 2022 – December 24th, 2022) – ASEC BLOG

January 5, 2023October 23, 2025 Securonix

ASEC tracked phishing email threats for December 18–24, 2022, finding Infostealer attachments (AgentTesla, FormBook) as the top threat type, followed by FakePage and Worm Malware; attackers also used various file extensions and C2 payloads. The report highligh…

Read More
Threat Research

NoName057(16) – The Pro-Russian Hacktivist Group Targeting NATO

January 5, 2023October 14, 2025 Securonix

NoName057(16) is a pro-Russian hacktivist group conducting DDoS campaigns targeting Ukraine, NATO, and other entities, leveraging Telegram, a volunteer-driven DDoS program, and a GitHub-hosted toolkit. The group has impacted several sectors including governmen…

Read More
Threat Research

NeedleDropper – Avast Threat Labs

January 4, 2023October 16, 2025 Securonix

NeedleDropper is a multi-file dropper observed since October 2022 that uses a self-extracting archive to deliver and execute payloads, hiding activity with junk data and leveraging legitimate applications. It is sold as a service on hacking forums and has bloc…

Read More
Threat Research

Crypto-inspired Magecart skimmer surfaces via digital crime haven

January 4, 2023October 18, 2025 Securonix

Researchers identified a crypto-themed Magecart skimmer built on the Mr.SNIFFA toolkit that targets e-commerce sites, employing obfuscation and whitespace encoding to load its payload and exfiltrate payment data. The operation runs on Russian-hosted infrastruc…

Read More
Threat Research

Emotet returns and deploys loaders

January 4, 2023October 13, 2025 Securonix

Emotet has returned after four months of inactivity, reviving spam campaigns and leveraging its loader-as-a-service model to deploy other malware. The campaign shows evolving social engineering and obfuscation techniques, continuing to drop modules like IcedID…

Read More
Threat Research

A Deep Dive Into poweRAT: a Newly Discovered Stealer/RAT Combo Polluting PyPI

January 4, 2023October 13, 2025 Securonix

Phylum documents a PyPI malware campaign delivering a PowerShell-based loader and a stealer/RAT combo (poweRAT) through a multi-stage setup.py, with extensive obfuscation and data theft. The campaign leverages persistence, a Cloudflare Tunnel to expose a Flask…

Read More
Threat Research

ASEC Weekly Phishing Email Threat Trends (December 25th, 2022 – December 31st, 2022) – ASEC BLOG

January 4, 2023October 13, 2025 Securonix

This weekly ASEC report analyzes phishing email threats from December 25–31, 2022, focusing on attachments used to deliver malware. It highlights Infostealer, FakePage, and Worm Malware as top attachment-based threats, detailing file extensions, distribution s…

Read More
Threat Research

警惕:魔改后的CIA攻击套件Hive进入黑灰产领域

December 30, 2022October 15, 2025 Securonix

A wild Hive-derived backdoor xdr33 was captured in the wild, repurposing CIA’s Hive project source with embedded BEACON and Trigger modules to steal sensitive data and establish footholds. The malware uses mutual TLS with client certificates, encrypts device i…

Read More
Threat Research

Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa

December 30, 2022October 14, 2025 Securonix

Bluebottle, a financially motivated cyber-crime group, continues targeting Francophone banks in Africa by using living-off-the-land techniques, commodity malware, and no custom malware. The campaign aligns with prior OPERA1ER activity but introduces new TTPs s…

Read More
Threat Research

Dark Web Markets Compete for the Drug Trafficking and Illegal Pharmacy Monopoly

December 30, 2022October 16, 2025 Securonix

The article surveys how major dark Web drug markets have become a multi-hundred-million-dollar ecosystem, with a shift toward mobile apps and instant messaging for buying, selling, and coordinating deliveries. It highlights ongoing wars for market share (Hydra…

Read More
Threat Research

Cyble – LummaC2 Stealer: A Potent Threat To Crypto Users

December 28, 2022October 18, 2025 Securonix

CRIL researchers uncovered LummaC2 Stealer, a 32-bit GUI malware targeting Chromium and Mozilla browsers to exfiltrate crypto wallets, browser extensions, and 2FA data. The campaign includes a Russian-language seller site, Telegram channels, and active C2 serv…

Read More
Threat Research

Turla: A Galaxy of Opportunity

December 28, 2022October 16, 2025 Securonix

Two sentences summarizing the Turla activity described: Turla leveraged USB spread to introduce legacy ANDROMEDA into Ukrainian and other targets, then deployed KOPILUWAK to profile victims and QUIETCANARY to exfiltrate data, with multiple stages delivered via…

Read More

Posts pagination

Previous 1 … 436 437 438 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.