Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East

September 23, 2022October 13, 2025 Securonix

Symantec details Witchetty’s expanded toolset, including Backdoor.Stegmap and the LookBack backdoor, which use steganography and a GitHub-hosted bitmap loader to hide and deliver payloads. The operation is tied to TA410 and Cicada/APT10, with past and present …

Read More
Threat Research

Cyble – Bl00dy – New Ransomware Strain Active In The Wild

September 23, 2022October 13, 2025 Securonix

Bl00dy is a newly discovered ransomware strain that uses double extortion and leaks victim data via Telegram rather than hidden Tor channels. It encrypts files with CryptoAPI, renames them with a .bl00dy extension, drops ransom notes, and propagates laterally …

Read More
Threat Research

Redline Stealer and Mozilla Thunderbird

September 23, 2022October 14, 2025 Securonix

eSentire’s Threat Response Unit details a Redline Stealer campaign against a manufacturing customer, delivered via a malicious Mozilla Thunderbird setup hosted on a lookalike thunderbiird[.]com and distributed in an ISO. The attacker uses an obfuscated AutoIT …

Read More
Threat Research

The Anatomy of Wiper Malware, Part 3: Input/Output Controls | CrowdStrike

September 22, 2022October 17, 2025 Securonix

Part 3 of a four-part series on wiper malware analyzes how input/output controls (IOCTLs) and related Windows kernel interfaces are weaponized to gather disk information, manage disk volumes, and destroy data. It highlights IOCTLs used by DriveSlayer and other…

Read More
Threat Research

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID

September 21, 2022October 14, 2025 Securonix

Unit 42 reveals a polyglot CHM file used to deliver the IcedID information stealer, weaving deception to evade detection by showing a benign decoy window first and launching malicious activity on a second run. The threat chain includes phishing with a ZIP, an …

Read More
Threat Research

Void Balaur | The Sprawling Infrastructure of a Careless Mercenary

September 21, 2022October 14, 2025 Securonix

Void Balaur is a prolific cyber mercenary group expanding its hack-for-hire campaigns globally through 2022, continuing to adapt its operations despite disruptions to its advertising personas. The group targets a broad mix of individuals and organizations, foc…

Read More
Threat Research

Hunting for Unsigned DLLs to Find APTs

September 21, 2022October 16, 2025 Securonix

Threat actors increasingly rely on unsigned DLL loading to execute payloads, enabling stealthy operations by abusing signed processes. The investigation highlights Stately Taurus (PKPLUG/Mustang Panda) and Selective Pisces (Lazarus Group) and shows how unsigne…

Read More
Threat Research

Agent Tesla RAT Delivered by Quantum Builder With New TTPs

September 21, 2022October 14, 2025 Securonix

ThreatLabz details a campaign delivering Agent Tesla via a configurable “Quantum Builder,” which creates LNK, HTA, and ISO payloads to execute a multi-stage infection. The campaign uses obfuscated PowerShell, LOLBins, and UAC bypass techniques to obtain admin …

Read More
Threat Research

Cyble – New Information Stealer Targeting Crypto-wallets

September 21, 2022October 14, 2025 Securonix

CRIL researchers traced a malicious domain used in a spear-phishing campaign to steal Office 365 credentials and to host a new information stealer, Doenerium Stealer, which masquerades as legitimate Windows tools and is available on GitHub. The malware exhibit…

Read More
Threat Research

NSIS Type of LockBit 3.0 Ransomware Disguised as Job Application Emails Being Distributed – ASEC BLOG

September 20, 2022October 14, 2025 Securonix

LockBit 3.0 is distributed via phishing emails disguised as job applications, using NSIS installers that deliver a nested payload. It encrypts user files, disables security services, and leaves a ransom note and wallpaper changes, with AhnLab detailing detecti…

Read More
Threat Research

Threat analysis: Malicious npm package mimics Material Tailwind CSS tool

September 20, 2022October 17, 2025 Securonix

Two sentences summarizing the article: ReversingLabs details a malicious npm package masquerading as Material Tailwind that installs via a postinstall script to download a password-protected ZIP containing a Windows executable. The campaign employs obfuscated …

Read More
Threat Research

NullMixer drops Redline Stealer, SmokeLoader and other malware

September 20, 2022October 16, 2025 Securonix

NullMixer acts as a dropper delivering a wide range of malware families by redirecting users from cracked software sites through SEO-driven pages. It drops numerous trojans and stealers, including SmokeLoader, RedLine Stealer, PseudoManuscrypt, ColdStealer, an…

Read More
Threat Research

Spam email campaign targeting businesses delivers the Agent Tesla stealer

September 20, 2022October 13, 2025 Securonix

Mass malicious mailing campaigns are moving toward targeted-style operations, impersonating real companies and delivering malicious attachments. The payload is Agent Tesla, a credential-stealing malware that can exfiltrate data through various channels and per…

Read More
Threat Research

BumbleBee: Round Two

September 19, 2022October 15, 2025 TheDFIR

May 2022 intrusion used BumbleBee as the initial access vector to deploy Cobalt Strike and Meterpreter across the network. The actors delivered a hidden DLL via an ISO/LNK chain, then moved laterally with RDP/SMB and remote access tools before being evicted; t…

Read More
Threat Research

Security alert: new phishing campaign targets GitHub users

September 19, 2022October 15, 2025 Securonix

Threat actors targeted GitHub users with a phishing campaign impersonating CircleCI to harvest credentials and 2FA codes, affecting many organizations even though GitHub itself was not breached. Attackers leverage stolen credentials to persist, access private …

Read More

Posts pagination

Previous 1 … 454 455 456 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.