Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

C2 Communications Through outlook.com – SANS Internet Storm Center

October 17, 2022October 14, 2025 Securonix

A malware dropper uses Outlook.com email as its command-and-control channel, polling a mailbox via IMAP and exfiltrating results back through email. The Python-based dropper decrypts a payload with AES, executes commands via a shell, and uses base64/ROT13 enco…

Read More
Threat Research

CoinMiner Being Installed on Vulnerable Apache Tomcat Web Server – ASEC BLOG

October 17, 2022October 14, 2025 Securonix

Two security analyses reveal attacks against vulnerable Apache Tomcat servers that are not up to date, using JexBoss to install a WebShell and gain control with Meterpreter. The attackers then use a Base64-encoded PowerShell downloader to fetch and run scripts…

Read More
Threat Research

Online Shoppers Beware: Scammers Most Likely to Impersonate DHL – Check Point Blog

October 17, 2022October 13, 2025 Securonix

Checkpoint’s Brand Phishing Report for Q3 2022 shows DHL as the brand most impersonated in phishing attempts (22%), with Microsoft (16%) and LinkedIn (11%) following; Instagram also enters the top ten due to a blue-badge phishing campaign. The report highlight…

Read More
Threat Research

“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed

October 17, 2022October 17, 2025 Securonix

Dormant Colors describes a widespread campaign of malicious browser extensions that infect millions of users via malvertising, then covertly load and update weaponized code to harvest data and enable targeted fraud. The investigation exposes a robust, globally…

Read More
Threat Research

Rapidly Evolving Magniber Ransomware – ASEC BLOG

October 17, 2022October 18, 2025 Securonix

Two-sentence summary: The Magniber ransomware has evolved rapidly in 2022, shifting file extensions, injection techniques, and UAC bypass methods to dodge anti-malware detection. The analysis highlights frequent format changes and registry-focused tactics, alo…

Read More
Threat Research

LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company

October 17, 2022October 17, 2025 Securonix

Trend Micro analyzed an LV ransomware intrusion tied to ProxyShell and ProxyLogon exploits affecting a Jordan-based company, highlighting double-extortion and expanding affiliate activity. The report details the infection chain—from Exchange vulnerabilities an…

Read More
Threat Research

Analysis on Attack Techniques and Cases Using RDP – ASEC BLOG

October 14, 2022October 17, 2025 Securonix

RDP is commonly used for initial compromise and lateral movement, including via wrappers when native remote desktop support is unavailable. The article also covers how attackers add user accounts, drop RDP-related malware, and employ credential theft and sessi…

Read More
Threat Research

WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group

October 14, 2022October 13, 2025 Securonix

Two Zscaler ThreatLabz reports reveal WarHawk, a new backdoor used by the SideWinder APT to target Pakistan, delivering Cobalt Strike via a multi-module loader that includes KernelCallBackTable injection and a Pakistan Standard Time check. The campaign leverag…

Read More
Threat Research

#StopRansomware: Daixin Team | CISA

October 14, 2022October 17, 2025 Securonix

Daixin Team is a ransomware and data extortion group focused on Healthcare and Public Health sector targets in the U.S., using VPN compromises and credential theft to deploy ransomware on ESXi servers and exfiltrate data. The FBI/CISA/HHS advisory details TTPs…

Read More
Threat Research

Trends in Web Threats: Old Web Skimmer Still Active Today

October 14, 2022October 14, 2025 Securonix

Palo Alto Networks analyzes trends in web threats by examining malicious landing and host URLs, including where they are hosted, their categories, and associated malware families, with a focus on cryptominers, JS downloaders, web skimmers, and redirects. The r…

Read More
Threat Research

Cyble – Infostealer Distributed Using Bundled Installer

October 14, 2022October 14, 2025 Securonix

Cyble researchers describe Temp Loader and Temp Stealer, malicious tools advertised on the Dark Web that bundle with cracked software to drop a loader and an information stealer. The malware targets crypto wallets and various data sources, uses anti-VM and Run…

Read More
Threat Research

Attackers Abusing Various Remote Control Tools – ASEC BLOG

October 14, 2022October 17, 2025 Securonix

Attackers increasingly abuse legitimate remote-control tools to secretly take control of infected systems and evade detection. The article surveys backdoor and RAT families and real-world cases where tools like AnyDesk, TeamViewer, and VNC are misused for remo…

Read More
Threat Research

Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability

October 14, 2022October 18, 2025 Securonix

In April, VMware patched CVE-2022-22954, but attacks exploiting remote code execution via server-side template injection persisted, delivering Mirai variants, RAR1Ransom, and GuardMiner payloads to exposed VMware Workspace ONE Access and Identity Manager insta…

Read More
Threat Research

Threat Advisory: Monitoring CVE-2022-42889 “Text4Shell” Exploit Attempts

October 14, 2022October 16, 2025 Securonix

Wordfence Threat Intelligence monitored exploit attempts targeting CVE-2022-42889, aka Text4Shell, across millions of sites and observed payloads in DNS, script, and URL prefixes aimed at remote code execution. Most activity leverages DNS prefix probes to cont…

Read More
Threat Research

Two Weeks of Monitoring ProxyNotShell (CVE-2022-41040 & CVE-2022-41082) Threat Activity

October 13, 2022October 15, 2025 Securonix

Two zero-day Exchange vulnerabilities, CVE-2022-41040 and CVE-2022-41082 (ProxyNotShell), are being actively exploited in the wild, with over 1.6 million exploit attempts observed across 4 million protected websites. The activity shows GET-based probing agains…

Read More

Posts pagination

Previous 1 … 449 450 451 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.