Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

LofyGang – Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year

October 7, 2022October 16, 2025 CTI

Checkmarx identified roughly 200 malicious NPM packages linked to the crime group LofyGang that abused typosquatting, sub-dependencies, and legitimate cloud services to distribute credential-stealing and Discord-targeted malware. The actors used Discord bots a…

Read More
Threat Research

Alchimist: A new attack framework in Chinese for Mac, Linux and Windows

October 7, 2022October 18, 2025 Securonix

Cisco Talos uncovers a new all-in-one offensive framework, Alchimist, with a GoLang-based C2 and a companion RAT called Insekt that targets Windows, Linux, and Mac, featuring a Chinese web UI and remote administration. The dropper/c2 stack includes MacOSX expl…

Read More
Threat Research

WIP19 Espionage | New Chinese APT Targets IT Service Providers and Telcos With Signed Malware

October 7, 2022October 20, 2025 Securonix

WIP19 is a Chinese-speaking threat cluster targeting telecommunications and IT service providers in the Middle East and Asia, using a stolen DEEPSoft certificate to sign multiple malware components. The operation features mature tooling (including SQLMaggie an…

Read More
Threat Research

Cyble – Massive Tech Support Scam Exposed

October 7, 2022October 18, 2025 Securonix

Cyble Research & Intelligence Labs (CRIL) uncovered a mass tech support scam ecosystem that uses phishing sites impersonating Microsoft and Apple support to push fake Windows Defender alerts. Victims who contact the fake helplines are then compromised via remo…

Read More
Threat Research

8220 Gang Cloud Botnet Targets Misconfigured Cloud Workloads

October 7, 2022October 18, 2025 Securonix

8220 Gang continues to infect misconfigured cloud workloads by exploiting outdated Docker, Apache, WebLogic, and Log4J services and expanding its cryptocurrency-mining botnet. It rotates infrastructure, uses PureCrypter MaaS, and distributes miners via Discord…

Read More
Threat Research

Budworm: Espionage Group Returns to Targeting U.S. Organizations

October 7, 2022October 13, 2025 Securonix

Budworm is resurfacing in the U.S. targeting high-value entities with a mix of malware and openly available tools, including DLL side-loading via legitimate processes and C2 infrastructure hosted on VPS services. The campaign centers on HyperBro, with occasion…

Read More
Threat Research

다양한 원격 제어 도구들을 악용하는 공격자들 – ASEC BLOG

October 6, 2022October 13, 2025 Securonix

Attackers increasingly rely on legitimate remote access tools and backdoors to infiltrate networks, move laterally, and harvest data. The article surveys common backdoors, RATs, and remote control tools (e.g., AnyDesk, TeamViewer, ToDesk, AveMaria) used in rea…

Read More
Threat Research

ASEC Weekly Malware Statistics (September 26th, 2022 – October 2nd, 2022) – ASEC BLOG

October 6, 2022October 13, 2025 Securonix

Downloader ranked top with 38.2%, followed by info-stealer with 35.1%, ransomware with 14.7%, backdoor with 11.6%, and CoinMiner with 0.4% for the week of September 26th to October 2nd, 2022. Top families included BeamWinHTTP, Smokeloader, Stop Ransomware, Vid…

Read More
Threat Research

Ukrainian Military-Themed Excel File Delivers Multi-Stage Cobalt Strike Loader | Fortinet Blog

October 6, 2022October 15, 2025 Securonix

FortiGuard Labs details a Ukrainian-military-themed Excel XLSM document that hides a multi-stage loader which ends with Cobalt Strike Beacon on the victim’s machine. The campaign uses macro-based delivery, obfuscation, shortcut-based execution, and scheduled-t…

Read More
Threat Research

Qakbot Being Distributed as ISO Files Instead of Excel Macro – ASEC BLOG

October 6, 2022October 14, 2025 Securonix

Malware is increasingly distributed via ISO files, with multiple families adopting the method. Qakbot has shifted from Excel macros to ISO-based delivery, alongside AsyncRAT, IcedID, and BumbleBee. #Qakbot #ISOFiles

Read More
Threat Research

Deep Analysis of Snake Keylogger

October 5, 2022October 17, 2025 Securonix

Snake Keylogger is a .NET-based malware that focuses on stealing credentials, keystrokes, screenshots, and clipboard data. The article walks through multi-stage unpacking, heavy obfuscation, runtime DLL loading, process hollowing for payload execution, persist…

Read More
Threat Research

The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform

October 5, 2022October 14, 2025 Securonix

Security researchers outline detection strategies for the Caffeine phishing service platform, including endpoint and network indicators. They provide YARA rules, domain infrastructure details, and defensive best practices to mitigate PhaaS-based phishing campa…

Read More
Threat Research

Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike

October 5, 2022October 15, 2025 Securonix

Trend Micro researchers document a QAKBOT-driven intrusion that escalates to Brute Ratel C4 and Cobalt Strike payloads attributed to Black Basta operators, highlighting a shift toward commercial C2/attack emulation tools in real-world ransomware campaigns. The…

Read More
Threat Research

Lazarus Group Uses the DLL Side-Loading Technique (mi.dll) – ASEC BLOG

October 5, 2022October 17, 2025 Securonix

Researchers tracked the Lazarus group using DLL Side-Loading (T1574.002) to run a malicious DLL via legitimate Windows processes. The attackers staged a backdoor (mi.dll) loaded from the same folder as the host process (wsmprovhost.exe) and used open-source Bu…

Read More
Threat Research

Tracking Earth Aughisky’s Malware and Changes

October 4, 2022October 17, 2025 Securonix

Earth Aughisky (Taidoor) remains a long-running APT, gradually adapting its malware toolkit across Taiwan and Japan. The post catalogs Earth Aughisky’s malware families, their connections to other groups, and potential strategic shifts, highlighting a broader …

Read More

Posts pagination

Previous 1 … 451 452 453 … 490 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.