Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

LockBit 3.0 Being Distributed via Amadey Bot – ASEC BLOG

November 1, 2022October 14, 2025 Securonix

Attackers are distributing LockBit 3.0 by leveraging Amadey Bot as a downloader, using malicious Word documents and executables disguised as Word files to drop the malware. Amadey is used to contact a C2 server and fetch LockBit payloads, including PowerShell-…

Read More
Threat Research

DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework

November 1, 2022October 13, 2025 Securonix

DeimosC2 is presented as an open-source post-exploitation C2 framework that attackers may consider alongside Cobalt Strike, with details on how it operates, how its traffic and binaries can be identified, and defensive recommendations. The report covers Deimos…

Read More
Threat Research

SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

October 31, 2022October 16, 2025 Securonix

SocGholish operators have significantly expanded and diversified their malware staging infrastructure since mid-2022, adding about 18 new second-stage servers per month to counter defenders and scale operations. The majority of these new servers are in Europe …

Read More
Threat Research

Robin Banks still might be robbing your bank (part 2)

October 31, 2022October 16, 2025 Securonix

IronNet analyzes how the Robin Banks phishing-as-a-service platform has evolved to evade takedowns, relocate infrastructure to a Russian provider, and add features like cookie-stealing to bypass MFA. The study highlights how open-source code and off-the-shelf …

Read More
Threat Research

APT-36 Uses New TTPs and New Tools to Target Indian Governmental Organizations

October 28, 2022October 16, 2025 Securonix

APT-36 (Transparent Tribe) targets Indian government personnel with evolving TTPs, including malvertising, credential harvesting, and a newly documented data exfiltration tool named Limepad. Zscaler ThreatLabz explains how the group abuses Google Ads and third…

Read More
Threat Research

RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom

October 28, 2022October 17, 2025 Securonix

RomCom threat actor campaigns spoof SolarWinds, KeePass, and PDF Reader Pro to deliver RomCom RAT, focusing on Ukraine with possible targets in the United Kingdom. Researchers note connections to Cuba Ransomware and Industrial Spy, while clarifying that vendor…

Read More
Threat Research

Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor

October 27, 2022October 17, 2025 Securonix

SentinelLabs provides a comprehensive analysis of Black Basta’s operational TTPs, revealing custom tools, EDR-evasion capabilities, and a likely link to FIN7. The findings suggest FIN7 developers may have contributed to Black Basta’s toolset, with privilege es…

Read More
Threat Research

ChromeLoader Observations on the Rise

October 27, 2022October 17, 2025 Securonix

eSentire’s TRU investigates ChromeLoader, a Chrome extension-based adware delivered via ISO shortcuts and activated through PowerShell to install the extension from the registry. The analysis highlights its persistence via Run keys, high-privilege browser mani…

Read More
Threat Research

Cyble – New Laplas Clipper Distributed Via SmokeLoader

October 27, 2022October 16, 2025 Securonix

Cyble Research and Intelligence Labs tracks SmokeLoader campaigns that carry SystemBC and Raccoon Stealer 2.0 (RecordBreaker) alongside a new clipper named Laplas Clipper targeting cryptocurrency users. Laplas Clipper uses clipboard hijacking to swap wallet ad…

Read More
Threat Research

Securonix Threat Labs Security Advisory: Apache Commons Text4Shell (CVE-2022-42889) Exploitation – Analysis and Detection

October 26, 2022October 14, 2025 Securonix

Text4Shell (CVE-2022-42889) is a critical remote code execution vulnerability in Apache Commons Text (versions 1.5–1.9) that can be triggered by crafted input strings to run code on vulnerable hosts. The advisory covers exploitation methods, potential post-exp…

Read More
Threat Research

Cranefly: Threat Actor Uses Previously Unseen Techniques and Tools in Stealthy Campaign

October 26, 2022October 16, 2025 Securonix

Symantec Broadcom Software uncovered a previously undocumented dropper, Trojan.Geppei, that reads commands from IIS logs to install a new backdoor (Trojan.Danfuan) and other tools. The campaign is linked—though not conclusively—to Cranefly and UNC3524, and it …

Read More
Threat Research

Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure

October 26, 2022October 17, 2025 Securonix

Financially motivated banking Trojans are analyzed for how they evade detection, steal data, and serve as infrastructure to deliver other malware. The article covers families such as Zeus, Kronos, Trickbot, IcedID, Emotet and Dridex, and discusses defenses lik…

Read More
Threat Research

Server-side attacks, C&C in public clouds and other MDR cases we observed

October 26, 2022October 14, 2025 Securonix

Two MDR case studies show attackers leveraging public clouds for C2, memory-resident toolsets, and targeted server-side intrusions across Exchange and SQL Server. The report also details long-text payloads, custom loaders, and exfiltration techniques used to s…

Read More
Threat Research

Surtr Ransomware Being Distributed in Korea – ASEC BLOG

October 26, 2022October 16, 2025 Securonix

Surtr ransomware is being distributed in Korea, encrypting files and appending a unique Surtr extension to filenames. It also alters the infected system’s desktop, drops ransom notes SURTR_README.hta and SURTR_README.txt, and performs anti-analysis checks befo…

Read More
Threat Research

What Does The Fox Hack? Breaking Down the Anonymous Fox F-Automatical Script

October 25, 2022October 16, 2025 Securonix

The article analyzes F-Automatical (FoxAuto) as Anonymous Fox’s seventh version of an automatic C2 script that runs post-exploitation tasks on compromised web servers. It covers how the script can persist, fetch remote modules, target multiple CMS, obfuscate i…

Read More

Posts pagination

Previous 1 … 447 448 449 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.