Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Cyble – Phishing Campaign Targets Japanese Tax Payers

September 7, 2022October 23, 2025 Securonix

Cyble researchers uncovered a phishing campaign impersonating Japan’s National Tax Agency to steal V-Preca card details from Japanese taxpayers, combining fake NTA sites, smishing, and Android malware (FakeCop) with extensive C2 infrastructure. The operation e…

Read More
Threat Research

THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence

September 7, 2022October 16, 2025 Securonix

Cybereason GSOC analysts detail a technique that uses Notepad++ plugins to persist and evade security controls, including how a malicious DLL is injected via the plugin loading process and how PowerShell and Meterpreter are used to establish C2. The report als…

Read More
Threat Research

Cyble – Phishing Campaign Targets Greek Banking Users

September 7, 2022October 22, 2025 Securonix

Cyble researchers uncovered a tax-refund phishing campaign targeting Greek banking users that uses a JavaScript keylogger to capture credentials entered on a fake government-site. The attackers redirect victims to fake net banking login UIs for several banks, …

Read More
Threat Research

A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities

September 6, 2022October 13, 2025 Securonix

Trend Micro analyzed post-exploitation activity abusing CVE-2020-14882 WebLogic vulnerability to deploy Kinsing cryptocurrency-mining malware. The report details how Trend Micro Vision One and Cloud One Workload Security detected, blocked, and traced the attac…

Read More
Threat Research

Opsec Mistakes Reveal COBALT MIRAGE Threat Actors

September 6, 2022October 17, 2025 Securonix

Secureworks CTU analyzed a June 2022 ransomware incident involving the Iranian COBALT MIRAGE group, highlighting continued use of known TTPs. The operation deployed ProxyShell exploits, web shells, and TunnelFish, encrypted servers with BitLocker, and left tra…

Read More
Threat Research

OriginLogger: A Look at Agent Tesla’s Successor

September 6, 2022October 13, 2025 Securonix

OriginLogger is a variant of the Agent Tesla keylogger and represents its successor with new configuration handling and deployment methods. The analysis covers its builder, string obfuscation, dropper workflow, and multi-channel exfiltration infrastructure, ty…

Read More
Threat Research

You never walk alone: The SideWalk backdoor gets a Linux variant

September 5, 2022October 14, 2025 Securonix

Researchers at ESET identified a Linux variant of the SideWalk backdoor used by SparklingGoblin against a Hong Kong university in February 2021, and found close ties to Specter RAT and Windows SideWalk variants. The campaign reveals shared C2 infrastructure, C…

Read More
Threat Research

Lorenz Ransomware Group Cracks MiVoice | Arctic Wolf

September 5, 2022October 17, 2025 Securonix

Arctic Wolf Labs analyzed a Lorenz ransomware intrusion that exploited CVE-2022-29499 on a Mitel MiVoice Connect appliance to gain initial access and deploy encryption with BitLocker. The attackers used LOLBins, Chisel tunneling, and FileZilla for data exfiltr…

Read More
Threat Research

New Wave of Espionage Activity Targets Asian Governments

September 5, 2022October 13, 2025 Securonix

Symantec details a new espionage campaign targeting Asian governments that uses DLL side-loading of legitimate software to load payloads, followed by credential theft and network-wide movement with a wide toolkit. The activity, spanning April–July 2022, hit a …

Read More
Threat Research

Credential Gathering From Third-Party Software

September 2, 2022October 15, 2025 Securonix

The article examines how third-party software can store credentials insecurely and how attackers can retrieve them to broaden access, with concrete examples across WinSCP, Git, RDCMan, OpenVPN, and various browsers. It also discusses protections in Cortex XDR …

Read More
Threat Research

Lazarus and the tale of three RATs

September 2, 2022October 15, 2025 Securonix

Cisco Talos reports Lazarus Group’s global campaign exploiting VMware Horizon vulnerabilities to gain long-term access to energy-sector targets, deploying VSingle, YamaBot, and the newly described MagicRAT implants. The activity shows post-exploitation, latera…

Read More
Threat Research

TA453 Uses Impersonation to Capitalize on FOMO | Proofpoint US

September 2, 2022October 15, 2025 Securonix

TA453, an Iran-aligned actor, expanded its social engineering with Multi-Persona Impersonation (MPI), using multiple actor-controlled personas within a single email thread to boost campaign credibility. The technique targets researchers and nuclear security do…

Read More
Threat Research

Dead or Alive? An Emotet Story

September 2, 2022October 15, 2025 TheDFIR

May 2022 saw an Emotet-driven intrusion that began with a phishing Excel document and culminated in a domain-wide compromise, Cobalt Strike beaconing, lateral movement, and data exfiltration via Rclone. Emotet has since resurfaced (with TrickBot support) and r…

Read More
Threat Research

Lampion Trojan Delivered with Cloud-Based Sharing | Cofense

September 2, 2022October 14, 2025 Securonix

Lampion, a banking Trojan, was analyzed as delivered through a phishing email that directs victims to a cloud-based link to obtain a ZIP file. The campaign uses a VBScript loader and WScript to fetch DLL payloads, which are injected into memory to steal bankin…

Read More
Threat Research

Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection

September 1, 2022October 16, 2025 Securonix

The article documents a rising ransomware trend called intermittent encryption, where attackers partially encrypt files to speed up infection and evade detection. It reviews several families adopting this approach (Qyick, Agenda, BlackCat/ALPHV, PLAY, Black Ba…

Read More

Posts pagination

Previous 1 … 457 458 459 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.