Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

SlowMist: Our In-Depth Investigation of North Korean APT’s Large-Scale Phishing Attack on NFT Users

December 22, 2022October 16, 2025 Securonix

SlowMist analyzes a North Korean APT operation that carried out a large-scale phishing campaign targeting NFT users, exposing how hundreds of fake NFT domains and decoy mint sites were used to harvest wallet approvals and data. The findings tie this campaign t…

Read More
Threat Research

Unveiling the IcedID BackConnect Protocol: Team Cymru Reveals

December 21, 2022October 13, 2025 Securonix

Team Cymru analyzes IcedID’s BackConnect protocol and uncovers how operators repurpose infected hosts as proxies to support distributed C2 activity, including VPN/Starlink/Tor-based routing and remote-access channels. The post also highlights observed tools an…

Read More
Threat Research

Google ad traffic leads to stealer packages based on free software

December 20, 2022October 19, 2025 Securonix

Two sentences summarizing the article: Google ad traffic redirected users to a fake TeamViewer page that delivered malware via a JavaScript download and a Windows Installer package chain. The infection used legitimate-looking software components (IrfanView, Au…

Read More
Threat Research

Nitol DDoS Malware Installing Amadey Bot – ASEC BLOG

December 20, 2022October 15, 2025 Securonix

ASEC researchers report that the Nitol DDoS Bot is used to install Amadey Bot, a downloader that drops additional malware. Amadey has resurfaced in cracks, keygens, and spam campaigns and was linked to LockBit 3.0 attacks targeting Korean corporate users. #Nit…

Read More
Threat Research

Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development

December 20, 2022October 17, 2025 Securonix

Vice Society has adopted a new custom-branded ransomware payload named PolyVice that uses NTRUEncrypt and ChaCha20-Poly1305 for strong encryption. The analysis indicates the same developers are selling customized payloads to multiple groups, signaling an outso…

Read More
Threat Research

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

December 20, 2022October 15, 2025 Securonix

Trend Micro researchers document a shift in the IcedID botnet’s distribution, now leveraging Google PPC malvertising to push the malware via fake pages of legitimate brands and apps. The campaign uses a patched loader built into DLLs, executed through a chain …

Read More
Threat Research

The Taxman Never Sleeps | FortiGuard Labs

December 20, 2022October 23, 2025 Securonix

FortiGuard Labs details a resurgence of Emotet delivering a tax-themed phishing attack purporting to be IRS-related. The chain starts with a compromised Pakistan-based email, moves through a password-protected ZIP containing a K-1 form spreadsheet with an Exce…

Read More
Threat Research

Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT | Trustwave

December 20, 2022October 15, 2025 Securonix

Trustwave SpiderLabs analyzed Ekipa RAT in the wild and found threat actors adopting Microsoft Publisher macros to push the trojan, alongside Word macros and XLL variants, as part of remote-template campaigns. The research shows Ekipa’s deployment in the Russi…

Read More
Threat Research

Kiss-a-Dog Discovered Utilizing a 20-Year-Old Process Hider

December 20, 2022October 17, 2025 Securonix

Kiss-a-Dog, a cryptojacking campaign, has evolved to broaden its reach from Docker/Kubernetes to Redis-based targets, introducing a 20-year-old open-source process hider and other payloads like Tsunami and XMRig. The variant uses Redis for initial access, down…

Read More
Threat Research

Microsoft research uncovers new Zerobot capabilities | Microsoft Security Blog

December 19, 2022October 18, 2025 Securonix

Microsoft Defender for IoT researchers track Zerobot, a Go-based IoT botnet evolving with new exploits and DDoS capabilities, spreading via IoT and web-vulnerability abuse and deployed as a service. Zerobot 1.1 expands attack methods, adds CVE-based exploits, …

Read More
Threat Research

Stolen certificates in two waves of ransomware and wiper attacks

December 19, 2022October 14, 2025 Securonix

Two waves of ransomware and wiper attacks targeted Albanian government and law-enforcement systems, with later samples signed using stolen digital certificates from Nvidia and Kuwait Telecommunications Company. The campaigns show cross-language cooperation, po…

Read More
Threat Research

Meddler-in-the-Middle Phishing Attacks Explained

December 16, 2022October 19, 2025 Securonix

Meddler-in-the-Middle (MitM) phishing uses reverse-proxy servers to relay legitimate login pages to victims, enabling credential theft and MFA bypass. This article surveys how MitM phishing kits work, real-world campaigns targeting Microsoft, CircleCI/GitHub, …

Read More
Threat Research

Threat Spotlight: XLLing in Excel – threat actors using malicious add-ins

December 16, 2022October 15, 2025 Securonix

Talos explores the use of Excel XLL add-ins as a new infection vector after VBA macros are being blocked by Microsoft. The piece details how XLLs operate, lists notable actors and malware families using XLLs, and offers defensive guidance. #XLL #ExcelDNA #APT1…

Read More
Threat Research

Cyble – New Ransomware Strains Emerging From Leaked Conti’s Source Code Ā 

December 16, 2022October 13, 2025 Securonix

Cyble Research and Intelligence Labs (CRIL) identify new ransomware strains—Putin Team, ScareCrow, BlueSky, and Meow—that were created from leaked Conti source code. These variants encrypt victim files, drop ransom notes, and frequently use Telegram to interac…

Read More
Threat Research

Detecting Windows AMSI Bypass Techniques

December 16, 2022October 15, 2025 Securonix

The article explains how Windows AMSI can be bypassed and how security teams can detect such abuse using Trend Micro Vision One and related products. It also outlines common bypass techniques, real-attack examples, and practical indicators for defenders. #AMSI…

Read More

Posts pagination

Previous 1 … 438 439 440 … 490 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.