Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

TA453: Activity, Techniques, & Targeting Explained | Proofpoint US

December 9, 2022October 18, 2025 Securonix

Proofpoint details TA453’s irregular campaigns (2020–2022), showing a shift toward compromised accounts, malware, and confrontational lures with possible IRGC support. The report highlights the Samantha Wolf persona and aggressive outreach suggesting TA453’s t…

Read More
Threat Research

Google ads lead to fake software pages pushing IcedID (Bokbot)

December 9, 2022October 19, 2025 Securonix

Two reports show Google Ads leading to fake software pages that push IcedID (Bokbot) via SEO poisoning and multiple redirects, including a fake AnyDesk site that downloads a malicious ZIP. The infection chain delivers an MSI that drops a DLL to install IcedID,…

Read More
Threat Research

Cyble – Venom RAT Expands Its Operations By Adding A Stealer Module 

December 9, 2022October 20, 2025 Securonix

Venom RAT has been updated with a stealer module that exfiltrates sensitive data to its C2 server, expanding its malicious capabilities. The malware now steals browser data, passwords, cookies, history, and even credit card details, while threat actors offer V…

Read More
Threat Research

Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine – Check Point Research

December 9, 2022October 13, 2025 Securonix

Cloud Atlas (Inception) is a long-running cyber-espionage group whose focus has narrowed to Russia, Belarus, and contested regions in Ukraine and Moldova since 2021–2022, including Crimea and Donetsk/Luhansk. In the past year they staged targeted intrusions us…

Read More
Threat Research

Phylum Detects Ongoing Typosquat/Ransomware Campaign in PyPI and NPM

December 9, 2022October 17, 2025 Securonix

Phylum reports an ongoing typosquatting campaign targeting Python and JavaScript developers on PyPI and NPM, delivering a ransomware payload when executed. The attacker publishes typosquatted packages (notably around the Python requests package) that fetch a l…

Read More
Threat Research

GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites | FortiGuard Labs

December 8, 2022October 19, 2025 Securonix

FortiGuard Labs uncovered a Go-based CMS scanner and brute-forcer named GoTrim that targets WordPress and OpenCart. It operates as a botnet for distributed brute-forcing, communicates with its C2 over encrypted channels, and can switch between client and serve…

Read More
Threat Research

Spikes in Attacks Serve as a Reminder to Update Plugins

December 8, 2022October 17, 2025 Securonix

Wordfence Threat Intelligence reports spike patterns in exploits targeting two WordPress plugins, Kaswara Modern VC Addons (

Read More
Threat Research

Probing Weaponized Chat Applications Abused in Supply-Chain Attacks

December 8, 2022October 17, 2025 Securonix

Trend Micro’s report reveals a supply-chain campaign that trojanized Comm100 and LiveHelp100 installers to deploy a JavaScript backdoor and multiple modules within Electron-based chat apps. The attackers used HTTP and WebSocket C2 channels to exfiltrate data, …

Read More
Threat Research

Royal Rumble: Analysis of Royal Ransomware

December 8, 2022October 16, 2025 Securonix

The Royal ransomware group emerged in early 2022 and has grown globally, deploying through multiple TTPs and affecting organizations worldwide. It uses a unique partial encryption approach with a flexible percentage, operates in a multi-threaded manner, and sh…

Read More
Threat Research

Cyble – Mallox Ransomware Showing Signs Of Increased Activity

December 7, 2022October 15, 2025 Securonix

Mallox ransomware activity has surged, driven by a .NET-based loader that downloads encrypted payloads and decrypts them in memory before encryption. The operation targets critical infrastructure, stops GPS-related services, and uses a private chat and leak si…

Read More
Threat Research

Drokbk Malware Uses GitHub as Dead Drop Resolver

December 7, 2022October 20, 2025 Securonix

Drokbk is a .NET-based malware used by COBALT MIRAGE Cluster B, consisting of a dropper and a payload that primarily executes commands from a remote C2 server. The campaign uses a GitHub dead-drop resolver to locate its C2 and demonstrates persistence via a Wi…

Read More
Threat Research

I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware

December 7, 2022October 14, 2025 Securonix

Attestation signing of drivers through the Windows Hardware Compatibility process is being abused to sign POORTRY and other malware samples with legitimate Microsoft certificates. The programName field in Authenticode data helps identify associated samples and…

Read More
Threat Research

Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers

December 7, 2022October 13, 2025 Securonix

SentinelOne observes threat actors abusing legitimately signed Microsoft drivers to intrude into telecom, BPO, MSSP, and financial services organizations. The activity centers on a two-component toolkit (STONESTOP and POORTRY) that terminates AV/EDR and can ev…

Read More
Threat Research

Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper – Check Point Research

December 7, 2022October 13, 2025 Securonix

Check Point Research details how Azov ransomware functions as a polymorphic wiper, including its ability to backdoor 64-bit executables and leverage the SmokeLoader botnet for distribution. The analysis notes an advanced, assembly-built payload with anti-analy…

Read More
Threat Research

Trojanized OneNote Document Leads to Formbook Malware | Trustwave

December 7, 2022October 17, 2025 Securonix

Trustwave SpiderLabs uncovered threat actors using a OneNote attachment to deliver Formbook malware via a Windows Script File overlay. The attack chain activates when users view the lure and PowerShell downloads and runs the Formbook payload from a remote host…

Read More

Posts pagination

Previous 1 … 440 441 442 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.