Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

MagicRAT: Lazarus’ latest gateway into victim networks

September 1, 2022October 13, 2025 Securonix

Cisco Talos identifies a new Lazarus Group remote access trojan named MagicRAT, deployed after exploiting publicly exposed VMware Horizon platforms. The malware, linked to TigerRAT and Lazarus infrastructure, includes persistence, reconnaissance, and the hosti…

Read More
Threat Research

THREAT ANALYSIS REPORT: PlugX RAT Loader Evolution

September 1, 2022October 17, 2025 Securonix

PlugX is a long-running, modular RAT used by Asia-based threat actors like APT27, featuring a loader that combines a legitimate executable, a malicious module, and a malicious payload. The report traces six loader samples from 2012–2022, detailing DLL side-loa…

Read More
Threat Research

Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection

September 1, 2022October 16, 2025 Securonix

The article documents a rising ransomware trend called intermittent encryption, where attackers partially encrypt files to speed up infection and evade detection. It reviews several families adopting this approach (Qyick, Agenda, BlackCat/ALPHV, PLAY, Black Ba…

Read More
Threat Research

BRONZE PRESIDENT Targets Government Officials

September 1, 2022October 14, 2025 Securonix

Bronze President targeted government officials using PlugX payloads across multiple documents and delivery methods. The campaign involved malicious archives, shortcuts, DLLs, and encrypted payloads linked to PlugX, with identified C2 servers associated to the …

Read More
Threat Research

The Curious Case of “Monti” Ransomware: A Real-World Doppelganger

September 1, 2022October 14, 2025 Securonix

Monti ransomware gang emerged during a July 2022 incident, encrypting 21 servers after exploiting Log4Shell in a VMware Horizon setup and leveraging both traditional Conti-like TTPs and new tooling. The operation highlighted Monti’s mimicry of Conti, its use o…

Read More
Threat Research

Mirai Variant MooBot Targeting D-Link Devices

August 31, 2022October 14, 2025 Securonix

Unit 42 researchers describe MooBot, a Mirai variant, that leverages four D-Link vulnerabilities to seize control of exposed devices and deploy a botnet for DDoS attacks. The campaign downloads MooBot from a remote host, communicates with a C2 server, and incl…

Read More
Threat Research

#StopRansomware: Vice Society | CISA

August 30, 2022October 15, 2025 Securonix

Joint FBI/CISA/MS-ISAC advisory details Vice Society’s ransomware operations, highlighting their methods, IOCs, and recommended mitigations for education-sector defenders. It notes that Vice Society uses variants such as Hello Kitty/Five Hands and Zeppelin and…

Read More
Threat Research

PSA: Nearly 5 Million Attacks Blocked Targeting 0-Day in BackupBuddy Plugin

August 30, 2022October 16, 2025 Securonix

Wordfence alerted to an actively exploited zero-day vulnerability in BackupBuddy that allowed unauthenticated file downloads from WordPress sites. Nearly 5 million attacks were blocked since August 26, 2022, and a patched version 8.7.5 was released on Septembe…

Read More
Threat Research

The Ares Banking Trojan Learns Old Tricks: Adds the Defunct Qakbot DGA

August 30, 2022October 14, 2025 Securonix

ThreatLabz reports an update to the Ares banking trojan that adds a domain generation algorithm (DGA) mirroring Qakbot’s DGA, likely to extend infection lifetimes and monetize compromised systems. The update includes C2 fallback via DGA, web inject testing, an…

Read More
Threat Research

Cyble – Adversaries Actively Utilizing PowerShell Empire

August 29, 2022October 18, 2025 Securonix

Cyble Research and Intelligence Labs (CRIL) detected active PowerShell Empire infrastructure being used in the wild, including multiple infections and post-exploitation activities leveraging the Empire framework. The article details Empire’s listener/stager/ag…

Read More
Threat Research

DangerousSavanna: Two-year long campaign targets financial institutions in French-speaking Africa – Check Point Research

August 29, 2022October 16, 2025 Securonix

DangerousSavanna is a two-year campaign targeting financial institutions in French-speaking Africa, employing spear-phishing and a diverse set of infection chains to deploy PoshC2 and AsyncRAT. The operation features evolving lures, modular payloads, and exten…

Read More
Threat Research

Pro-Russian Group Targeting Ukraine Supporters with DDoS Attacks – Avast Threat Labs

August 29, 2022October 17, 2025 Securonix

Avast Threat Labs details Bobik, a .NET Remote Access Trojan that now functions as a DDoS module within a botnet used by the pro-Russian group NoName057(16) to target Ukraine and nearby countries. The report maps the botnet’s C2 infrastructure, the multi-stage…

Read More
Threat Research

Play Ransomware Attack Playbook Similar to that of Hive, Nokoyawa

August 29, 2022October 14, 2025 Securonix

Play is a new ransomware family that mirrors Hive and Nokoyawa, suggesting shared operators and attack infrastructure. It differentiates itself with AdFind-based Active Directory discovery and a blend of LOLBins, GPO-based deployment, and double-extortion tech…

Read More
Threat Research

Raspberry Robin and Dridex: Two Birds of a Feather

August 26, 2022October 13, 2025 Securonix

IBM X-Force/MDR analysis connects Raspberry Robin infections with the Dridex malware and the Russia-based Evil Corp, revealing shared loader structures, anti-analysis techniques, and a workflow that leverages USB-based initial access. The report traces the inf…

Read More
Threat Research

BumbleBee a New Modular Backdoor Evolved From BookWorm

August 26, 2022October 16, 2025 Securonix

BumbleBee is described as a refactored, modular backdoor evolved from BookWorm, featuring a two-app architecture (server/controller and client/slave) with layered deployment and a loader chain that uses a legitimate executable to run shellcode. The campaign ap…

Read More

Posts pagination

Previous 1 … 458 459 460 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.