Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Chinese State-Sponsored Group TA413 Adopts New Capabilities in Pursuit of Tibetan Targets | Recorded Future

September 19, 2022October 19, 2025 Securonix

Recorded Future analyzes TA413, a Chinese state-sponsored group, detailing campaigns against the Tibetan community and the adoption of new capabilities, including the LOWZERO backdoor and exploitation of zero-days such as CVE-2022-1040 and Follina. The report …

Read More
Threat Research

Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

September 19, 2022October 16, 2025 Securonix

Coreid’s ransomware ecosystem continues evolving with Noberus, expanding cross-platform encryption and a growing data-exfiltration focus, supported by Exmatter and credential-stealing tools like Eamfo. Symantec/Sentinel Labs note ongoing affiliate updates and …

Read More
Threat Research

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

September 16, 2022October 19, 2025 Securonix

Domain shadowing is a stealth DNS hijacking technique where attackers create malicious subdomains under compromised domains, leveraging their benign reputation to carry out phishing, malware distribution, and C2 activities. Palo Alto Networks introduces an aut…

Read More
Threat Research

RAT Delivered Through FODHelper – SANS Internet Storm Center

September 16, 2022October 21, 2025 Securonix

I found a simple batch file (2.bat) that drops a Remcos RAT using an old fodhelper UAC bypass to gain high privileges. The dropper decodes embedded Base64 with certutil, then downloads and launches the malware chain, including a PowerShell-based stage that att…

Read More
Threat Research

NFT Malware Gets New Evasion Abilities

September 16, 2022October 15, 2025 Securonix

NFT-001 is a crypto/NFT malware campaign that evolved into a more evasive staged downloader delivering Remcos RAT, with phishing used to lure victims and a multi-stage payload chain designed to bypass defenses. The threat actor relies on private messages, DLL …

Read More
Threat Research

Surge in Magento 2 template attacks

September 16, 2022October 20, 2025 Securonix

Magento 2 template attacks now deploy backdoors via injected template code to install a Linux RAT and web backdoors, enabling persistent access and remote command control across potentially multi-node clusters. Variants include 223sam.jpg attack, health_check.…

Read More
Threat Research

A technical analysis of the leaked LockBit 3.0 builder

September 16, 2022October 18, 2025 Securonix

Two-sentence analysis of the leaked LockBit 3.0 builder, detailing how it generates RSA keys, embeds resources, and produces encryptor/decryptor payloads, with implications for potential LockBit forks. The piece highlights the tool’s capabilities and mentions …

Read More
Threat Research

Iranian State Actors Conduct Cyber Operations Against the Government of Albania | CISA

September 15, 2022October 15, 2025 Securonix

The FBI and CISA release a Cybersecurity Advisory detailing Iranian state actors, operating as HomeLand Justice, conducting destructive cyber operations against the Government of Albania in July and September 2022, including a year-long intrusion, ransomware-s…

Read More
Threat Research

Cyble – NetSupport RAT Distributed Via SocGholish

September 15, 2022October 13, 2025 Securonix

SocGholish is a JavaScript malware framework that uses social engineering toolkits masquerading as software updates to deploy malware on a victim’s system. Threat actors host malicious sites that lure users with fake browser updates, downloading an archive tha…

Read More
Threat Research

Technical Analysis of Crytox Ransomware

September 15, 2022October 15, 2025 Securonix

Crytox is a multi-stage ransomware that encrypts local and network drives using per-file AES-256 keys protected by a locally generated RSA key, while dropping the uTox messenger to enable victim-actor communication. It employs anti-analysis techniques (packing…

Read More
Threat Research

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

September 15, 2022October 15, 2025 Securonix

Trend Micro’s analysis shows active exploitation of CVE-2022-26134 in Atlassian Confluence servers for cryptocurrency mining and other malware. The attacker uses an OGNL payload to trigger remote code execution, downloads ro.sh and ap.sh scripts, and ultimatel…

Read More
Threat Research

PUP.Optional.AdMax

September 15, 2022October 17, 2025 Securonix

PUP.Optional.AdMax is Malwarebytes’ detection name for a family of browser extensions that are promoted in a deceptive way as ad blockers. Malwarebytes blocks the sites promoting them and provides remediation steps to detect and remove the PUP. #PUP.Optional.A…

Read More
Threat Research

DPRK Job Opportunity Phishing via WhatsApp | PuTTY Utility

September 14, 2022October 16, 2025 GoogleCloudIntel

In July 2022, during proactive threat hunting activities at a company in the media industry, Mandiant Managed Defense identified a novel spear phish methodology employed by the threat cluster tracked as UNC4034. Mandiant has identified several overlaps between this group and those we suspect have a North Korea nexus.

UNC4034 established communication…

Read More
Threat Research

Cyble – New Malware Campaign Targets Zoom Users

September 14, 2022October 17, 2025 Securonix

Cyble researchers uncovered a campaign that uses fake Zoom sites to spread Vidar Stealer to Zoom users. The malware drops binaries, injects into MSBuild, and communicates with C2 infrastructure via GitHub-hosted payloads and hardcoded addresses. #VidarStealer …

Read More
Threat Research

Meeting the “Ministrer” | Fortinet Blog

September 14, 2022October 14, 2025 Securonix

Fortinet’s FortiGuard Labs uncovered a Russian-language phishing email designed to deploy the Konni RAT linked to APT37, with persistence and C2 communications. The attack uses a Donbass.zip attachment containing decoy PowerPoint files and a malicious macro ch…

Read More

Posts pagination

Previous 1 … 455 456 457 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.