Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

HWP File Disguised as Personal Profile Form (OLE Object) – ASEC BLOG

August 26, 2022October 13, 2025 Securonix

ASEC researchers identified a malicious HWP document that exploits OLE objects and a Flash vulnerability (CVE-2018-15982), using embedded links to trigger execution. The attack drops files in %TEMP%, hides OLE objects, and can download and run additional paylo…

Read More
Threat Research

SafeBreach Uncovers New Remote Access Trojan (RAT)

August 26, 2022October 17, 2025 Securonix

SafeBreach Labs uncovered a new targeted remote access Trojan named CodeRAT that targets Farsi-speaking developers using a Word document with a DDE exploit. It features a versatile command set, uses Telegram bot API for C2 and public file-upload services for e…

Read More
Threat Research

BianLian Ransomware Gang Gives It a Go!

August 26, 2022October 13, 2025 Securonix

BianLian emerged as a relatively new ransomware actor deploying Go-based malware and using LOL (Living off the Land) techniques to move laterally while evading EDR during encryption. They exploited initial access vectors like ProxyShell and SonicWall VPNs, rap…

Read More
Threat Research

Raspberry Robin and Dridex: Two Birds of a Feather

August 26, 2022October 13, 2025 Securonix

IBM X-Force/MDR analysis connects Raspberry Robin infections with the Dridex malware and the Russia-based Evil Corp, revealing shared loader structures, anti-analysis techniques, and a workflow that leverages USB-based initial access. The report traces the inf…

Read More
Threat Research

Deep Dive into a Corporate Espionage Operation

August 25, 2022October 14, 2025 Securonix

Bitdefender’s deep-dive analyzes a corporate espionage operation targeting a small U.S. technology company, detailing how initial access was gained through an unpatched internet-facing vulnerability and how attackers staged months of data exfiltration. The ope…

Read More
Threat Research

Cyble – Highly Evasive Magecart JavaScript Skimmer Active In The Wild

August 25, 2022October 15, 2025 Securonix

Magecart threat actors target Magento-based online stores by injecting JavaScript skimmers into checkout pages to steal payment data. The skimmer loads an overlay form from an embedded JS file, collects card details and personal information, obfuscates and exf…

Read More
Threat Research

No Honor Among Thieves – Prynt Stealer’s Backdoor Exposed

August 25, 2022October 17, 2025 Securonix

Zscaler ThreatLabz reveals that Prynt Stealer’s builder contains a secret backdoor that exfiltrates victims’ data to a private Telegram chat watched by the builder’s developers, and that Prynt Stealer, WorldWind, and DarkEye are nearly identical variants. The …

Read More
Threat Research

ALERTA DE SEGURIDAD CIBERNÉTICA: INCIDENTE EN SERVICIO PÚBLICO – CSIRT de Gobierno

August 25, 2022October 15, 2025 Securonix

The Government CSIRT reports an active cyber security incident affecting a government service, attributed to ransomware targeting Microsoft and VMware ESXi servers. The malware encrypts VM-related files (changing them to a .crypt extension) and leaves a ransom…

Read More
Threat Research

Chromeloader browser hijacker

August 24, 2022October 15, 2025 Securonix

ChromeLoader, also known as Choziosi Loader, has evolved through multiple versions since late 2021, complicating atomic indicator-based detections. The analysis tracks its execution chain from obfuscated PowerShell to a Chrome/Edge/Firefox extension, detailing…

Read More
Threat Research

Malicious HWP File Disguised as a Happy Birthday Message (OLE Object) – ASEC BLOG

August 23, 2022October 13, 2025 Securonix

An ASEC analysis outlines a multi-stage malware chain beginning with a VBScript downloader fetched via curl that ultimately fetches and runs a malicious HWP document. The attackers use persistence, dynamic command delivery, and shelling out to remote scripts, …

Read More
Threat Research

Attackers Using FRP (Fast Reverse Proxy) to Attack Korean Companies – ASEC BLOG

August 23, 2022October 14, 2025 Securonix

A Korean-targeted intrusion campaign leveraged FRP-based reverse proxy techniques to gain unauthorized external access to internal networks, often starting with vulnerable IIS or MS Exchange servers. The operation included Webshells (ASPXSpy), privilege escala…

Read More
Threat Research

Malicious Word Files Targeting Specific Individuals Related to North Korea – ASEC BLOG

August 23, 2022October 17, 2025 Securonix

The ASEC analysis team reports the ongoing distribution of malicious Word documents targeting individuals tied to national defense and North Korea, with filenames referencing real people. The embedded macros download PowerShell scripts, collect host informatio…

Read More
Threat Research

PureCrypter is busy pumping out various malicious malware families

August 23, 2022October 16, 2025 Securonix

PureCrypter is a MaaS-type loader that promotes and downloads other malware families through a two-part downloader/injector architecture, leveraging hundreds of C2s to sustain distribution. It employs image-based masquerading, multiple encoding/encryption sche…

Read More
Threat Research

AsyncRAT: Using Fully Undetected Downloader

August 23, 2022October 14, 2025 Securonix

AsyncRAT is explored as an open-source remote administration tool that attackers abuse via a fully undetected downloader, delivered from an Amazon S3 bucket and followed by a PowerShell-based second stage. The analysis traces the infection flow from the FUD ba…

Read More
Threat Research

Cyber Espionage in the South China Sea | Proofpoint US

August 23, 2022October 18, 2025 Securonix

Proofpoint’s Threat Research Team links a long-running TA423/Red Ladon espionage operation to a 2022 ScanBox phishing campaign targeting Australian government, offshore energy, and international entities in the South China Sea. The operation impersonates Austr…

Read More

Posts pagination

Previous 1 … 459 460 461 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.