Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Some Kind of Monster: RaaS Hides Itself Using Traits From Other Malware

September 14, 2022October 14, 2025 Securonix

Monster is a Delphi-based ransomware-as-a-service (RaaS) that hides its capabilities and uses configurable features to customize encryption and evasion, raising the risk of attribution confusion. The BlackBerry analysis details its encryption methods, use of I…

Read More
Threat Research

Ransomware Roundup: Ragnar Locker Ransomware | FortiGuard Labs

September 14, 2022October 14, 2025 Securonix

Fortinet’s Ragnar Locker Ransomware Roundup explains that Ragnar Locker encrypts files, exfiltrates data, and uses double extortion to pressure victims, including negotiations via a Tor-based site and leaking stolen information on a “Wall of Shame.” It also no…

Read More
Threat Research

Credential Phishing Targeting Government Evolves | Cofense

September 14, 2022October 15, 2025 Securonix

Threat actors run credential-phishing campaigns that spoof U.S. government departments (DoL, DoC, DoT) to lure victims into submitting credentials via multi-step, convincingly branded PDFs and pages. The campaigns have evolved since 2019, improving email conte…

Read More
Threat Research

Cyble – Fake Telegram Site Delivering RAT Aimed At Chinese Users

September 13, 2022October 16, 2025 Securonix

CRIL researchers uncovered a fake Telegram download site that leads Windows users to a malicious MSI installer, which abuses Windows Defender components to operate a remote-access Trojan. The malware uses DLL side-loading, memory injection, and a C2 channel to…

Read More
Threat Research

Excel Document Delivers Multiple Malware By Exploiting CVE-2017-11882 – Part I | Fortinet Blog

September 13, 2022October 14, 2025 Securonix

FortiGuard Labs analyzed an Excel document that embeds a randomized payload and exploits CVE-2017-11882 to drop malware on Windows. The analysis traces how the document loads the embedded file, uses a vulnerability to execute code, downloads Formbook/Redline p…

Read More
Threat Research

Threat Alert: New Malware in the Cloud By TeamTNT

September 13, 2022October 16, 2025 Aquasec

The blog analyzes three recent honeypot infections attributed to TeamTNT, suggesting renewed activity after their 2021 farewell. It details multiple campaigns (Kangaroo, Cronb, What Will Be) that reuse familiar TeamTNT tools and techniques, including misconfig…

Read More
Threat Research

From the Front Lines | Slam! Anatomy of a Publicly-Available Ransomware Builder

September 12, 2022October 14, 2025 Securonix

Publicly available Slam Ransomware Builder lowers the barrier to entry for cybercriminals by offering free tooling, while presenting credible threats to enterprises. The article details Slam’s features, capabilities, and indicators of compromise to help defend…

Read More
Threat Research

RedLine spreads through ads for cheats and cracks on YouTube

September 12, 2022October 17, 2025 Securonix

Two sentences summarizing: A self-spreading malware bundle centers on the RedLine stealer, using cheats/cracks ads and YouTube video posts to propagate while stealing browser credentials and other data. The campaign combines loaders, startup persistence, and G…

Read More
Threat Research

Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine | Recorded Future

September 9, 2022October 19, 2025 Securonix

Insikt Group profiles UAC-0113 infrastructure linked with Sandworm, highlighting ongoing Ukrainian targeting and the use of dynamic DNS masquerades as Ukrainian telecom providers to host C2 and payload delivery. The analysis shows a shift from DarkCrystal to C…

Read More
Threat Research

Gamaredon APT targets Ukrainian government agencies in new campaign

September 8, 2022October 15, 2025 Securonix

Cisco Talos reports a new Gamaredon APT campaign targeting Ukrainian government entities, leveraging spear-phishing with Russian invasion-themed Office documents and malicious VBScript macros to seed infection. The operation uses a multi-stage chain (LNK in RA…

Read More
Threat Research

PrivateLoader: the loader of the prevalent ruzki PPI service

September 8, 2022October 15, 2025 Securonix

SEKOIA analysts document PrivateLoader as a modular downloader that operatess within the ruzki Pay-Per-Install (PPI) service to download and execute multiple payloads, enabling broad distribution of malware. The report links PrivateLoader to ruzki’s PPI ecosys…

Read More
Threat Research

Attackers Continue to Abuse Google Sites and Microsoft Azure to Host Cryptocurrency Phishing

September 8, 2022October 15, 2025 Securonix

Attackers continue to abuse Google Sites and Microsoft Azure Web Apps to host cryptocurrency phishing campaigns targeting major wallets and exchanges, with new pages and targets emerging over time. The operation relies on two stages—SEO-driven first pages and …

Read More
Threat Research

Malvertising on Microsoft Edge’s News Feed pushes tech support scams

September 8, 2022October 15, 2025 Securonix

Malvertising on the Microsoft Edge News Feed redirects users to tech support scam pages via the Taboola ad network. The operation uses a cloud-based infrastructure and fingerprinting to target victims while avoiding bots or blocks. #Taboola #EdgeNewsFeed #brow…

Read More
Threat Research

Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations | CISA

September 8, 2022October 15, 2025 Securonix

IRGC-affiliated cyber actors exploited known Fortinet FortiOS and Microsoft Exchange vulnerabilities, plus VMware Horizon Log4j flaws, to gain initial access and conduct ransomware-like operations involving data encryption and data extortion. The advisory outl…

Read More
Threat Research

Malicious Word Document with a Frameset

September 8, 2022October 20, 2025 Securonix

A Word OOXML document (docx) is used as a downloader by embedding a frameset that loads a second-stage payload when opened. The phishing sample “Order Confirmation 22839.docx” first delivers a malicious RTF (“92.doc”) which downloads the final malware, the Red…

Read More

Posts pagination

Previous 1 … 456 457 458 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.