Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Hack the Real Box: APT41’s New Subgroup Earth Longzhi

November 7, 2022October 16, 2025 Securonix

Earth Longzhi is a newly identified APT41 sub-group that conducted two campaigns (2020–2022) across Asia-Pacific with custom Cobalt Strike loaders and multiple loaders/tools to target government, infrastructure, healthcare, and defense sectors. The campaigns b…

Read More
Threat Research

How LNK Files Are Abused by Threat Actors

November 4, 2022October 16, 2025 Securonix

LNK (Shell Link) files are Windows shortcuts that threat actors increasingly abuse to execute binaries and stage attacks, including delivering payloads via PowerShell, VBScript, or MSHTA. The article explains the LNK file format, how attackers leverage it in s…

Read More
Threat Research

Cyble – Phishing Campaign Targeting Indonesian BRI Bank Using SMS Stealer

November 4, 2022October 15, 2025 Securonix

Cyble researchers uncovered a phishing campaign targeting Bank Rakyat Indonesia (BRI) that escalates by distributing Android SMS stealers to harvest OTPs and bypass 2FA. The operation begins with credential- and OTP-phishing sites, then installs a custom SMS s…

Read More
Threat Research

QBOT – A HTML Smuggling technique to target victims

November 4, 2022October 17, 2025 Securonix

QBot (Qakbot/QuackBot/Pinkslipbot) is leveraging a new HTML Smuggling technique to deliver and execute payloads through HTML5/JavaScript-encoded content embedded in HTML attachments, enabling attackers to bypass some network controls. This article details the …

Read More
Threat Research

#ShortAndMalicious: StrelaStealer aims for mail credentials

November 4, 2022October 13, 2025 Securonix

StrelaStealer is an undocumented custom malware analyzed by DCSO CyTec that aims to steal mail credentials from Thunderbird and Outlook. It spreads via ISO-delivered lures using polyglot DLL/HTML techniques, encrypts data with a XOR key, and communicates with …

Read More
Threat Research

Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns

November 3, 2022October 17, 2025 Securonix

IPFS is being exploited by threat actors to host phishing pages and malware payloads, leveraging its censorship-resistant hosting to resist takedowns. Cisco Talos observes multiple campaigns using IPFS to host and retrieve malicious content, complicating defen…

Read More
Threat Research

Magniber Ransomware Attempts to Bypass MOTW (Mark of the Web) – ASEC BLOG

November 3, 2022October 14, 2025 Securonix

Magniber has evolved to bypass Mark of the Web (MOTW) protections by using script-based delivery and a digital signature, while continuing to adapt delivery methods such as typosquatting. The analysis highlights how MOTW, UAC bypass via fodhelper, and registry…

Read More
Threat Research

Another Script-Based Ransomware – SANS Internet Storm Center

November 3, 2022October 17, 2025 Securonix

A VBScript-based sample demonstrates how script-based ransomware can be built and evade many antivirus products by using a multi-stage PowerShell payload delivered via environment variables. It encrypts a wide range of file types, drops a ransom note, and atte…

Read More
Threat Research

Cyble – Emotet Returns Targeting Users Worldwide

November 3, 2022October 14, 2025 Securonix

Emotet has re-emerged, spreading worldwide again via spam emails with Excel attachments and macro-enabled documents to download its payloads. The campaign delivers follow-on payloads like IcedID and Bumblebee and has historically offered Malware-as-a-Service (…

Read More
Threat Research

The Case of Cloud9 Chrome Botnet – Zimperium

November 3, 2022October 16, 2025 Securonix

Zimperium zLabs uncovered Cloud9, a Chrome browser botnet/RAT that can steal cookies, log keystrokes, mine cryptocurrency, and drop additional malware on a victim’s device. It spreads via threat-actor communities using fake installers and malicious sites (not …

Read More
Threat Research

Family Tree: DLL-Sideloading Cases May Be Related

November 3, 2022October 14, 2025 Securonix

Five DLL sideloading cases targeting government organizations in Asia show how threat actors reuse well-known techniques and progressively add complexity, including a USB worm in one case. A common loader shellcode and repeated infrastructure overlap across ca…

Read More
Threat Research

Formbook | Malware Trends Tracker

November 2, 2022October 15, 2025 Securonix

FormBook is a cheap, malware-as-a-service infostealer that appeals to operators with limited technical skills, yet it includes advanced evasion and data-collection capabilities. The article analyzes its behavior, distribution, and execution flow using ANY.RUN,…

Read More
Threat Research

Cyble – Pro-Russian Hacktivists Targeting Adversaries With Killnet Ransomware

November 2, 2022October 14, 2025 Securonix

Cyble researchers uncovered a data-destructive ransomware tied to the pro-Russian Killnet group, rebranding Chaos ransomware to target adversaries. The analysis details Killnet ransomware’s execution flow, including privilege escalation, persistence, targeted …

Read More
Threat Research

Tips and Tricks: Using the .NET Obfuscator Against Itself | FortiGuard Labs

November 2, 2022October 14, 2025 Securonix

Fortinet threat researchers demonstrate a technique to use the net obfuscator against itself to reveal strings from a Warzone RAT variant, focusing on decoding encoded strings stored in a resource. The post walks through implementing a custom decoder in Visual…

Read More
Threat Research

DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework

November 1, 2022October 13, 2025 Securonix

DeimosC2 is presented as an open-source post-exploitation C2 framework that attackers may consider alongside Cobalt Strike, with details on how it operates, how its traffic and binaries can be identified, and defensive recommendations. The report covers Deimos…

Read More

Posts pagination

Previous 1 … 446 447 448 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.