Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Unwrapping Ursnifs Gifts

December 28, 2022October 22, 2025 TheDFIR

Ursnif (Gozi/ISFB) was delivered via a malicious ISO containing a LNK file, leading to a complex execution flow that included a renamed rundll32 and later persistence. The attackers then deployed Cobalt Strike, performed manual discovery, dumped LSASS memory, …

Read More
Threat Research

Infostealer Malware: Targeting the Italian Region

December 28, 2022October 17, 2025 Securonix

The campaign targets Italy with phishing emails carrying a password-protected ZIP named “IT_Fattura_n99392.zip” to drop an infostealer payload. It uses a multi-stage chain (LNK and BAT files) and a PowerShell/MSHTA/Rundll32 sequence to download and execute com…

Read More
Threat Research

In-depth Analysis of the PyTorch Dependency Confusion – Aqua

December 27, 2022October 14, 2025 Aquasec

An attacker exploited a PyTorch-nightly dependency confusion by uploading a malicious Torchtriton package to PyPI, causing users to pull a counterfeit binary. The malware exfiltrates data via DNS to a domain controlled by the attacker, and the post explains th…

Read More
Threat Research

Zoom Users At Risk In Latest Malware Campaign – Cybersecurity Blog By Cyble

December 27, 2022October 15, 2025 Securonix

Cyble researchers identified a phishing campaign that uses a Zoom-themed page to deliver the IcedID payload. Attackers drop two binaries, disguise Zoom installation, load IcedID in memory, gather system details, and communicate with a C2 server via a cookie-li…

Read More
Threat Research

BlindEagle Targeting Ecuador With Sharpened Tools – Check Point Research

December 23, 2022October 15, 2025 Securonix

Blind Eagle (APT-C-36) has intensified its Ecuador-focused campaign with an upgraded infection chain, delivering a QuasarRAT-based payload via a password‑protected LHA package and multiple stages. The operation combines geo-filtered phishing, a MediaFire drop,…

Read More
Threat Research

Shc Linux Malware Installing CoinMiner – ASEC BLOG

December 23, 2022October 14, 2025 Securonix

An ASEC analysis reveals a Linux malware chain built with Shc that installs a XMRig CoinMiner and a Perl-based DDoS IRC Bot after compromising SSH services. The campaign uses RC4-based encoding, a Shc downloader, and a run script to fetch payloads and configur…

Read More
Threat Research

Raspberry Robin Detected ITW Targeting Insurance & Financial Institutes In Europe

December 23, 2022October 18, 2025 Securonix

Raspberry Robin is an automated framework targeting European financial institutions, with upgraded downloader capabilities, in-memory shellcode, and encrypted command-and-control channels. Researchers note expanded victim data collection, modular C2 via a comp…

Read More
Threat Research

SlowMist: Our In-Depth Investigation of North Korean APT’s Large-Scale Phishing Attack on NFT Users

December 22, 2022October 16, 2025 Securonix

SlowMist analyzes a North Korean APT operation that carried out a large-scale phishing campaign targeting NFT users, exposing how hundreds of fake NFT domains and decoy mint sites were used to harvest wallet approvals and data. The findings tie this campaign t…

Read More
Threat Research

Navigating the Vast Ocean of Sandbox Evasions

December 22, 2022October 15, 2025 Securonix

Malware authors employ a wide range of sandbox evasion techniques, from instrumentation checks and VM detection to requiring human interaction and timing tricks, and defenders counter with bespoke analysis approaches and memory-focused detection. The article s…

Read More
Threat Research

“MasquerAds” — Google’s Ad-Words Massively Abused by Threat Actors, Targeting Organizations, GPUs…

December 22, 2022October 16, 2025 Securonix

Threat actors misuse Google’s ad platform to push masquerAd sites that redirect users to phishing and malware pages, leveraging trusted ad traffic to gain credibility. Vermux leads mass campaigns targeting GPU users, distributing varying payloads via masquerAd…

Read More
Threat Research

Cyble – Pure Coder Offers Multiple Malware For Sale In Darkweb Forums

December 22, 2022October 16, 2025 Securonix

CRIL uncovers Alibaba2044’s PureLogs stealer and related PureCoder malware offerings being sold in darkweb forums, with a December 14, 2022 spam campaign targeting Italian users. The piece details multiple tools (PureLogs, PureCrypter, PureMiner, BlueLoader, P…

Read More
Threat Research

Trade with caution – bad guys are stealing

December 22, 2022October 16, 2025 Securonix

ThreatLabz uncovered a campaign where threat actors use a backdoored TradingView Desktop installer to drop SmokeLoader, which then retrieves ArkeiStealer. The operation combines a fake TradingView domain, a Windows Installer masquerade, and dynamic config to h…

Read More
Threat Research

PSA: YITH WooCommerce Gift Cards Premium Plugin Exploited in the Wild

December 22, 2022October 13, 2025 Securonix

Wordfence Threat Intelligence tracked a critical Arbitrary File Upload vulnerability in YITH WooCommerce Gift Cards Premium (versions

Read More
Threat Research

BlueNoroff introduces new methods bypassing MoTW

December 22, 2022October 13, 2025 Securonix

BlueNoroff group expanded its malware delivery methods to bypass Mark-of-the-Web (MOTW) protections by using ISO and VHD disk image formats, and began experimenting with Visual Basic Script, Windows Batch scripts, and a Windows executable. They also operated a…

Read More
Threat Research

Beware of What Is Lurking in the Shadows of Your IT

December 22, 2022October 17, 2025 Securonix

IBM Security X-Force traced an entrenched adversary that maintained access to two organizations for 381 days via a Shadow IT bridged network, pivoting across a multi-domain forest and evading visibility with a rogue networking device. The findings highlight Sh…

Read More

Posts pagination

Previous 1 … 437 438 439 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.