Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

WatchDog Continues to Target East Asian CSPs

November 14, 2022October 16, 2025 Securonix

Researchers at Cado Labs report the re-emergence of WatchDog, a threat actor known for cryptojacking cloud resources. The new campaign targets East Asian Cloud Service Providers using a shell script and a Monero wallet, revealing defense evasion, competitive m…

Read More
Threat Research

Tips and Tricks: Debugging .NET Malware in a Multi-Stage Malware Deployment | FortiGuard Labs

November 14, 2022October 15, 2025 Securonix

This post explains how Fortinet researchers debugged a multi-stage .NET malware chain used for Warzone RAT by exporting and running each stage independently, then dumping the next stage for analysis. It covers building a wrapper app to run KeysNormalize.dll, r…

Read More
Threat Research

ARCrypter Ransomware Expands Its Operations From Latin America to the World

November 11, 2022October 15, 2025 Securonix

ARCrypter is a previously unknown ransomware family that emerged in Latin America (notably Chile, with Invima involvement) and has expanded to victims in China and Canada, featuring a two-stage dropper and payload and a ransom note delivered before encryption.…

Read More
Threat Research

Venus Ransomware | Zeoticus Spin-off Shows Sophistication Isn’t Necessary for Success

November 11, 2022October 13, 2025 Securonix

Venus ransomware, also known as Goodgame, operates as a standalone legacy package with links to Zeoticus and has been encrypting files globally since August 2022. It relies on publicly exposed RDP and common attack techniques rather than sophisticated malware,…

Read More
Threat Research

Wipermania: An All You Can Wipe Buffet

November 10, 2022October 18, 2025 Securonix

The article surveys more than twenty wiper families, examining trends, techniques, overlaps, and how actors—from activists to nation-states—use destructive software in 2022. It also discusses defense tips and the complexities of attribution, highlighting how w…

Read More
Threat Research

It’s a Puny World After All – Krebs on Security

November 10, 2022October 17, 2025 Securonix

An online banking fraud group calling itself the Disneyland Team uses Punycode-based domains to spoof banks and harvest credentials, often coordinating with Gozi 2.0/Ursnif malware to drain accounts. They employ a Web-based control panel, fake bank pages, and …

Read More
Threat Research

Extracting ‘HTTP CONNECT’ Requests with Python

November 9, 2022October 16, 2025 Securonix

Two-sentence summary: The article describes using a Python script to extract and summarize HTTP CONNECT requests from PCAPs captured at a honeypot, illustrating how such traffic can reveal proxy-based tunneling activity. It also notes that larger datasets may …

Read More
Threat Research

Emotet Malware Is Back – Virus Analysis | Proofpoint US

November 9, 2022October 16, 2025 Securonix

Emotet resurfaced in early November 2022 after a four-month hiatus, resuming high-volume email campaigns and acting as a delivery network for other malware families. Proofpoint notes significant changes to Emotet’s lures, payloads, modules, loader, and packer,…

Read More
Threat Research

Typhon Reborn With New Capabilities

November 9, 2022October 21, 2025 Securonix

Cyble Research Labs uncovered Typhon Stealer and its updated variant Typhon Reborn, crypto-miner/stealer tools marketed for hire with wallet theft, keystroke monitoring, and anti-analysis features. Typhon Reborn adds stronger anti-analysis, expanded data colle…

Read More
Threat Research

DAGON LOCKER Ransomware Being Distributed – ASEC BLOG

November 9, 2022October 17, 2025 Securonix

DAGON Locker ransomware is being distributed in Korea, often via phishing emails, and operates as a ransomware-as-a-service with variable distribution strategies. It uses a memory-resident 64-bit EXE and employs strong encryption with ChaCha20 and RSA-2048, wh…

Read More
Threat Research

New RapperBot Campaign – We Know What You Bruting for this Time | FortiGuard Labs

November 9, 2022October 16, 2025 Securonix

FortiGuard Labs reports that RapperBot has re-emerged in October 2022 as a DDoS-focused IoT botnet aimed at game servers, leveraging Telnet brute-forcing with embedded credentials to propagate. The campaign maintains a similar C2 protocol to earlier RapperBot …

Read More
Threat Research

Dtrack expands its operations to Europe and Latin America

November 9, 2022October 14, 2025 Securonix

DTrack is a Lazarus group backdoor used across a wide range of targets, including financial environments, a nuclear power plant, and targeted ransomware campaigns. The analysis highlights a multi-stage deployment with decryption and obfuscation, plus expanding…

Read More
Threat Research

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

November 9, 2022October 13, 2025 Securonix

Symantec links a state-sponsored activity to Billbug (aka Thrip/Lotus Blossom), targeting a certificate authority and government/defense agencies across Asia since March 2022. The operation employs dual-use tools and backdoors (Hannotog and Sagerunex), uses St…

Read More
Threat Research

BumbleBee Zeros in on Meterpreter

November 8, 2022October 14, 2025 TheDFIR

A May 2022 intrusion used BumbleBee as the initial access vector via a Contact Forms campaign, delivering an ISO containing an LNK and a DLL to load Meterpreter and Cobalt Strike Beacons. The attackers conducted multi-stage post-exploitation including UAC bypa…

Read More
Threat Research

Hack the Real Box: APT41’s New Subgroup Earth Longzhi

November 7, 2022October 16, 2025 Securonix

Earth Longzhi is a newly identified APT41 sub-group that conducted two campaigns (2020–2022) across Asia-Pacific with custom Cobalt Strike loaders and multiple loaders/tools to target government, infrastructure, healthcare, and defense sectors. The campaigns b…

Read More

Posts pagination

Previous 1 … 445 446 447 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.