Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

New Kiss-a-dog Cryptojacking Campaign Targets Docker and Kubernetes

October 25, 2022October 16, 2025 Securonix

CrowdStrike tracks a new cryptojacking campaign, Kiss-a-dog, targeting vulnerable Docker and Kubernetes infrastructure with an obscured domain, container escape, and anonymous mining pools. The operation uses multiple C2 servers, user- and kernel-mode rootkits…

Read More
Threat Research

CLDAP Reflectors on the Rise Despite Best Practice – Lumen

October 24, 2022October 15, 2025 CTI

CLDAP reflectors are rising as a multi-vector DDoS mechanism, leveraging UDP reflection to amplify traffic and complicate mitigation. Black Lotus Labs tracks open CLDAP reflectors, analyzes their behavior, and provides guidance on reducing exposure and blockin…

Read More
Threat Research

Follina Exploit Leads to Domain Compromise

October 24, 2022October 17, 2025 TheDFIR

An intrusion in early June 2022 leveraged the Follina CVE-2022-30190 vulnerability embedded in a malicious Word document to install Qbot (Qakbot/Pinksliplot) and pivot through the network toward a domain compromise. Attackers used Cobalt Strike, NetSupport Man…

Read More
Threat Research

Who put the “Dark” in DarkVNC?

October 24, 2022October 15, 2025 Securonix

Brad Duncan surveys VNC-based malware activity over the years, tracing how what’s been labeled DarkVNC/HiddenVNC has evolved into broader malicious VNC use across multiple families and campaigns. The post concludes that the “Dark” label isn’t fixed, documentin…

Read More
Threat Research

Venus Ransomware targets remote desktop services – ThreatDown by Malwarebytes

October 21, 2022October 16, 2025 Securonix

Venus ransomware targets publicly exposed Remote Desktop services to encrypt Windows devices, abusing insecure RDP access to spread. Infections result in files ending with the .venus extension and a ransom note demanding payment. #VenusRansomware #RemoteDeskto…

Read More
Threat Research

Archive Sidestepping Self-Unlocking Password-Protected RAR

October 20, 2022October 19, 2025 Securonix

Trustwave SpiderLabs details a threat campaign that uses password-protected archives with nested self-extracting RARsfx to deliver malware, predominantly via Emotet botnet spam. The payloads include CoinMiner and QuasarRAT, with adversaries employing obfuscati…

Read More
Threat Research

Where is the Origin QAKBOT Uses Valid Code Signing

October 20, 2022October 13, 2025 Securonix

QAKBOT is observed using valid code signing certificates to sign malicious modules, enabling trusted-looking infections. The article reviews infection timelines, potential origins of abused certificates, and recommended countermeasures. #QAKBOT #Follina

Read More
Threat Research

A Case of Malware Infection by the Lazarus Attack Group Disabling Anti-Malware Programs With the BYOVD Technique – ASEC BLOG

October 20, 2022October 16, 2025 Securonix

The Lazarus threat actor exploited a watering hole to infiltrate target systems and then leveraged a vulnerability in MagicLine4NX to reach internal networks. They used BYOVD and a rootkit to disable anti-malware, then established internal access via RDP and S…

Read More
Threat Research

AgentTesla Being Distributed via VBS – ASEC BLOG

October 19, 2022October 31, 2025 Securonix

AgentTesla is being distributed through malicious VBScript (VBS) attached to emails, with the VBS payload obfuscated and decoded to eventually execute PowerShell and inject AgentTesla into a legitimate process. The campaign shows evolving delivery methods—from…

Read More
Threat Research

Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity | Microsoft Security Blog

October 19, 2022October 18, 2025 Securonix

Microsoft’s analysis shows Raspberry Robin as part of a broader, interconnected malware ecosystem that enables pre-ransomware activity across thousands of devices, linking USB-driven infections to follow-on hands-on-keyboard attacks and ransomware deployments.…

Read More
Threat Research

APT10: Tracking down LODEINFO 2022, part II

October 18, 2022October 13, 2025 Securonix

LODEINFO underwent multiple upgrades in 2022, expanding its backdoor capabilities, encryption, and evasion techniques while continuing to target primarily Japanese entities. The article details complex C2 communications, 64-bit memory injection, and evolving b…

Read More
Threat Research

Ransomware Spotlight: BlackCat – Security News

October 18, 2022October 16, 2025 Securonix

BlackCat (ALPHV) ransomware has risen to prominence with a Rust-based framework, triple extortion tactics, and a growing affiliate network that leverages diverse attack vectors. Trend Micro highlights evolving TTPs—from Emotet-assisted initial access to privat…

Read More
Threat Research

Brute Ratel Config Decoding update

October 18, 2022October 15, 2025 Securonix

Brute Ratel’s config decoding update shows that Brute Ratel now uses a dynamic key to decrypt its onboard configuration, though the hardcoded key still exists for decrypting some strings. The article walks through RC4-based encryption, base64 decoding, and two…

Read More
Threat Research

Fake Hungarian Government Email Drops Warzone RAT | FortiGuard Labs

October 18, 2022October 18, 2025 Securonix

FortiGuard Labs analyzed a phishing campaign that impersonates the Hungarian government to deliver the Warzone RAT through a disguised PDF-like executable. The campaign stacks multiple obfuscated .NET binaries in memory, uses MaaS-style malware, and employs ev…

Read More
Threat Research

卷土重来的DDoS狂魔:Fodcha僵尸网络再次露出獠牙

October 18, 2022October 13, 2025 Securonix

360Netlab documents the return of the Fodcha DDoS botnet, detailing a renewed version with a dual OpenNIC/ICANN C2 and strong encryption to evade detection, plus large-scale DDoS operations that exceeded tens of thousands of bots and terabit traffic. The post …

Read More

Posts pagination

Previous 1 … 448 449 450 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.