Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

MAR-10365227-1.v1 – Impacket | CISA

October 4, 2022October 14, 2025 Securonix

CISA’s Malware Analysis Report examines CovalentStealer, a data-exfiltration malware used against a Defense Industrial Base (DIB) organization by suspected APT actors, detailing its file-enumeration, targeting, and upload workflow. The malware leverages embedd…

Read More
Threat Research

A Visualizza into Recent IcedID Campaigns:

October 4, 2022October 15, 2025 Securonix

Team Cymru’s Recon/BARS analysis dissects IcedID (BokBot) campaigns from September 2022, shedding light on Stage 1 downloader C2 infrastructure, delivery chains, and victim telemetry to reveal how threat actors evolve infrastructure across campaigns. The post …

Read More
Threat Research

Cyble – Modified FiveM Spoofer Targeting Gamers   

October 4, 2022October 16, 2025 Securonix

CRIL identified a malicious site cloud-spoofer.xyz that redirects users to a Discord channel to buy a FiveM unban spoofer. The tool is modified to download AsyncRAT and a stealer from remote servers, delivering malware to gamers. #CloudSpoofer #FiveM #Discord …

Read More
Threat Research

MAR-10365227-2.v1 – Impacket 2 | CISA

October 4, 2022October 20, 2025 Securonix

Cybersecurity analysts from CISA analyzed HyperBro malware samples linked to a Defense Industrial Base incident, detailing a backdoor capable of file transfer, keystroke logging, and remote command execution. The report covers four analyzed files, a C2 endpoin…

Read More
Threat Research

Evolution of BazarCall Social Engineering Tactics

October 4, 2022October 15, 2025 Securonix

The article documents BazarCall’s evolution from email bait to phone-based social engineering that prompts victims to download malware, including BazaarLoader and other families such as Trickbot, Gozi IFSB, and IcedID. It outlines a three-phase attack (bait, a…

Read More
Threat Research

Excel Document Delivers Multiple Malware by Exploiting CVE-2017-11882 – Part II | FortiGuard Labs

October 3, 2022October 16, 2025 Securonix

FortiGuard Labs analyzed an Excel document delivering Redline malware via CVE-2017-11882. The loader uses in-memory techniques and persistence via Task Scheduler to exfiltrate sensitive data to a C2 server over HTTP using a WCF SOAP channel. Hashtags: #Redline…

Read More
Threat Research

HTML File Attachments: Still A Threat | Trustwave

October 3, 2022October 13, 2025 Securonix

Trustwave SpiderLabs observes HTML file attachments being used prominently in phishing spam, with HTML/HTM collectively accounting for about 14.09% of attachments, second only to EXE files. The report describes how these HTML attachments mimic sign-in pages an…

Read More
Threat Research

Cyble – % Fake Ransomware Infection Under Widespread

October 3, 2022October 13, 2025 Securonix

Cyble Research and Intelligence Labs (CRIL) tracked phishing campaigns distributing a fake ransomware that does not encrypt files but renames them, drops ransom notes, and threatens payment. The campaign uses masquerading techniques (double extensions like Sex…

Read More
Threat Research

MSSQL, meet Maggie

October 3, 2022October 16, 2025 Securonix

Researchers from DCSO CyTec uncovered Maggie, a novel backdoor for Microsoft SQL servers hidden as an Extended Stored Procedure DLL called sqlmaggieAntiVirus_64.dll. Maggie runs commands, interacts with files, and can function as a network bridge with a SOCKS5…

Read More
Threat Research

Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims

October 3, 2022October 13, 2025 Securonix

BlackBerry Research & Intelligence uncovers a Mustang Panda operation targeting Myanmar that uses PlugX malware delivered via legitimate HP utilities embedded in RAR archives. The campaign employs DLL side-loading and domain-based C2 infrastructure masqueradin…

Read More
Threat Research

Analysis of LilithBot Malware and Eternity Threat Group

September 30, 2022October 16, 2025 Securonix

LilithBot is a multifunction malware sold as Malware-as-a-Service by the Eternity group, distributed through Telegram and Tor, with modules for botnet operations, stealer, clipper, miner, and more. The campaign showcases evolving features, including anti-debug…

Read More
Threat Research

From Zero To 50k Infections – PseudoManuscrypt Sinkholing – Part 1 | Bitsight

September 30, 2022October 15, 2025 Securonix

Researchers built a sinkhole for PseudoManuscrypt and mapped its infections by analyzing a custom UDP/TCP C2 protocol layered over KCP, including how L1/L2 messages are structured and parsed. The work reveals extensive domain-based C2 activity and a rapid botn…

Read More
Threat Research

Delivery of Malware: A Look at Phishing Campaigns in Q3 2022 | FortiGuard Labs

September 30, 2022October 16, 2025 Securonix

Fortinet FortiGuard Labs analyzes phishing-driven malware campaigns in Q3 2022, highlighting the use of HTML Smuggling, Excel 4.0 macros, Word VBA macros, and ISO image delivery to drop Emotet, Qbot, and Icedid. The report details multiple delivery chains and …

Read More
Threat Research

Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse

September 30, 2022October 13, 2025 Securonix

Researchers analyzed a Go-based BlackByte variant and uncovered an advanced technique to bypass security products by abusing a legitimate but vulnerable driver (RTCore64.sys) to disable protection. The technique, a “Bring Your Own [Vulnerable] Driver” approach…

Read More
Threat Research

SolarMarker Malware Activity

September 30, 2022October 14, 2025 Securonix

eSentire has observed a significant rise in SolarMarker infections delivered via drive-by download attacks that rely on social engineering to persuade users to execute malware disguised as document templates. SolarMarker is a modular information-stealing malwa…

Read More

Posts pagination

Previous 1 … 452 453 454 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.