Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

How Similar Is the Microsoft Account-stealing Phishing Page to the Actual Page? – ASEC BLOG

December 5, 2022October 14, 2025 Securonix

Researchers analyzed a sophisticated fake Microsoft account login phishing page used to harvest credentials. The page mirrors Microsoft’s login and uses encryption, anti-snooping measures, and script obfuscation to evade detection. #MicrosoftAccount #FakeMS #C…

Read More
Threat Research

A Custom Python Backdoor for VMWare ESXi Servers | Official Juniper Networks Blogs

December 5, 2022October 13, 2025 Securonix

Juniper Threat Labs uncovered a custom Python backdoor implanted on a VMware ESXi host, persisting by editing startup and proxy configuration and exposing a local webserver that can run commands or establish a reverse shell. The attackers also wired a reverse …

Read More
Threat Research

Iranian Exploitation Activities Continue as of November 2022

December 2, 2022October 17, 2025 Securonix

Team Cymru tracks ongoing Iranian-linked activity by the PHOSPHORUS group, with a focus on a long-running C2 server at 107.173.231.114 and related infrastructure. The activity includes exploiting unpatched Exchange servers (Log4J and ProxyShell) and using IP- …

Read More
Threat Research

Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT

December 2, 2022October 16, 2025 Securonix

Trend Micro intercepted a Linux cryptomining campaign that now incorporates the CHAOS Remote Administrative Tool (CHAOSRAT) to enhance control over infected hosts. The operation persists via cron-based mechanisms, downloads XMRig and the RAT from distributed s…

Read More
Threat Research

New MuddyWater Threat: Old Kitten; New Tricks | Deep Instinct

December 2, 2022October 15, 2025 Securonix

MuddyWater (aka Static Kitten, Mercury) is an Iran MOIS-linked cyber espionage group that has expanded its targeting with campaigns using spearphishing and legitimate remote administration tools. The latest campaign uses HTML attachments and hosted archives to…

Read More
Threat Research

Cyble – Threat Actors Targeting Fans Amid FIFA World Cup Fever

December 2, 2022October 13, 2025 Securonix

Threat Actors are exploiting FIFA World Cup buzz to run a range of scams, including crypto phishing with fake NFT drops, fake FIFA-themed domains, WhatsApp-led scams, and broad malware campaigns. Cyble Research & Intelligence Labs (CRIL) documents multiple lur…

Read More
Threat Research

eSentire Threat Intelligence Malware Analysis: Redline Stealer

December 2, 2022October 16, 2025 Securonix

Redline Stealer is a popular credential stealer distributed via fake software and advertising channels, featuring obfuscation, loader capabilities, and C2 over a non-standard channel. The threat actor uses an AutoIt wrapper, a configurable loader, and a robust…

Read More
Threat Research

Breaking the silence – Recent Truebot activity

December 1, 2022October 15, 2025 Securonix

Since August 2022, Truebot (Silence.Downloader) infections have surged, with two botnets observed: a globally distributed one (notably targeting Mexico, Brazil, and Pakistan) and a newer US-focused botnet impacting Windows servers and several education-sector …

Read More
Threat Research

Compromised Cloud Compute Credentials: Case Studies From the Wild

December 1, 2022October 16, 2025 Securonix

Cloud compute credentials attacks target misconfigured cloud compute services to steal credentials and access cloud infrastructure, causing costly resource usage and remediation work. The article presents two real-world cases—one in AWS Lambda and one in Googl…

Read More
Threat Research

Fake Security App Found Abuses Japanese Payment System | McAfee Blog

December 1, 2022October 17, 2025 McAfee

Authored by SangRyol Ryu and Yukihiro OkutomiĀ  McAfee’s Mobile Research team recently analyzed new malware targeting mobile payment users in…
The post Fake Security App Found Abuses Japanese Payment System appeared first on McAfee Blog….

Read More
Threat Research

Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers

November 30, 2022October 16, 2025 Securonix

ThreatFabric researchers describe a multi-platform campaign that binds malicious payloads to legitimate apps via a darknet service called Zombinder, delivering Android banking trojan Ermac alongside Windows desktop malware (Erbium, Aurora, Laplas, and Xenomorp…

Read More
Threat Research

eSentire Threat Intelligence: GootLoader Striking with a New…

November 30, 2022October 14, 2025 Securonix

eSentire’s Threat Response Unit analyzed GootLoader’s latest infection technique against a pharmaceutical company, revealing a compromised WordPress site delivering a large, obfuscated JavaScript payload and a new persistence method. The malware uses scheduled…

Read More
Threat Research

Exposing TAG-53’s Credential Harvesting Infrastructure Used for Russia-Aligned Espionage Operations

November 30, 2022October 14, 2025 Securonix

Insikt Group profiles TAG-53 infrastructure that overlaps with Callisto Group, COLDRIVER, and SEABORGIUM, detailing patterns in domain naming, TLS certificates from Let’s Encrypt, hosting clusters, and a small set of autonomous systems, suggesting long-running…

Read More
Threat Research

DeathStalker targets legal entities with new Janicab variant

November 30, 2022October 14, 2025 Securonix

Deathstalker has deployed a new Janicab variant targeting legal entities in the Middle East and Europe, leveraging YouTube-based dead-drop resolvers (DDRs) and a multi-stage VBScript loader to deliver Janicab. The operation shows expanded targets (including tr…

Read More
Threat Research

CISA Alert AA22-335A: Cuba Ransomware Analysis, Simulation, TTPs & IOCs

November 30, 2022October 15, 2025 Picussecurity

The Cuba Ransomware group Tropical Scorpius is analyzed in relation to its Cuba variant, including attack simulations added by Picus Threat Library. The report maps out a wide set of TTPs from initial access to impact, and notes connections to the Industrial S…

Read More

Posts pagination

Previous 1 … 441 442 443 … 490 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.