Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Cyble – Mini Stealer: Possible Predecessor Of Parrot Stealer

August 22, 2022October 17, 2025 Securonix

Cyble researchers report a threat actor began releasing MiniStealer’s builder and panel for free, with Parrot Stealer allegedly based on MiniStealer. The campaign targets Windows systems and steals data from Chromium-based browsers and FTP applications, signal…

Read More
Threat Research

Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications – Check Point Research

August 22, 2022October 23, 2025 Securonix

Check Point Research uncovered Nitrokod, a Turkish-based crypto-miner campaign that hides malware in legitimate-looking apps like Google Translate Desktop and has infected machines across 11 countries. The operation uses a multi-stage infection chain with long…

Read More
Threat Research

BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar

August 22, 2022October 14, 2025 Securonix

BlueSky ransomware is an emerging threat observed since mid-2022 that spreads through trojanized downloads and phishing emails, with rapid encryption and outbound lateral movement in Windows environments. It uses multi-stage PowerShell droppers, SMB-based prop…

Read More
Threat Research

Advanced BEC Scam Campaign Targeting Executives on O365

August 22, 2022October 17, 2025 Securonix

Mitiga uncovered an advanced business email compromise (BEC) campaign that targets executives via Office 365, combining high-end spear-phishing with adversary-in-the-middle (AiTM) techniques to bypass MFA and achieve persistence. Attackers monitor significant …

Read More
Threat Research

Remcos RAT New TTPS – Detection & Response – Security Investigation

August 21, 2022October 17, 2025 Securonix

Remcos RAT is a remote access trojan sold by Breaking Security, marketed for legal use but widely used for malicious operations, including the potential to build botnets. It can capture screenshots, log keystrokes, and exfiltrate data to attacker servers, with…

Read More
Threat Research

32 or 64 bits Malware?

August 20, 2022October 18, 2025 Securonix

An analyst investigates whether 64-bit malware is becoming more common by analyzing 217GB of ZIP archives from MalwareBazaar, applying YARA to differentiate 32-bit and 64-bit PE files. The study finds a rising but still-small share of 64-bit samples and highli…

Read More
Threat Research

Cyble – Moisha Ransomware In Action 

August 19, 2022October 16, 2025 Securonix

Cyble Research Labs analyzed a targeted .NET-based ransomware variant named Moisha, linked to the PT_MOISHA team. Moisha uses double-extortion to exfiltrate and encrypt data, while disabling defenses and threatening data leakage if payment isn’t made. #Moisha …

Read More
Threat Research

BleachGap Revamped – K7 Labs

August 19, 2022October 23, 2025 Securonix

BleachGap is a single-executable ransomware variant analyzed by K7 Labs that functions as a stealer and encryptor, using in-memory encoding to evade detection and exfiltrates data to a Discord webhook. The campaign includes disabling security tools, enumeratin…

Read More
Threat Research

New Golang Ransomware Agenda Customizes Attacks

August 19, 2022October 14, 2025 Securonix

A Go-written ransomware named Agenda targets healthcare and education organizations in Asia and Africa, customizing payloads per victim with unique IDs and leaked credentials. It can reboot in safe mode, terminate server-related processes, and uses affiliate-s…

Read More
Threat Research

Defending in a hostile environment: Key findings from the BlackHat NOC

August 19, 2022October 15, 2025 Securonix

IronDefense documented a unique Black Hat NOC environment where real malware activity and classroom demos co-exist, revealing notable infections like SHARPEXT, Shlayer, and NetSupport RAT. The findings highlight the challenges of defending a highly segmented, …

Read More
Threat Research

Demystifying Qbot Malware

August 19, 2022October 16, 2025 Securonix

Qbot (QakBot) infections surged in 2022, with Trellix SecOps documenting its evolving delivery vectors and detection strategies to outpace defenses. The post details Qbot’s infection chain, MITRE technique mappings, IOCs, and Trellix detection/hunting guidance…

Read More
Threat Research

Roasting 0ktapus: The phishing campaign going after Okta identity credentials

August 19, 2022October 19, 2025 Securonix

Security researchers describe a phishing campaign attributed to 0ktapus that targets Okta identity credentials, using a large set of look-alike domains to harvest user data. The article catalogs hundreds of IPs and domains used in the campaign’s infrastructure…

Read More
Threat Research

Compromised Microsoft Dynamic 365 Customer Voice | Cofense

August 18, 2022October 14, 2025 Securonix

Threat actors abuse a compromised Microsoft Dynamics 365 Customer Voice account to send spoofed eFax notifications and lure recipients into credential phishing. The campaign spreads broadly across sectors by leveraging a legitimate service to host a fake eFax/…

Read More
Threat Research

Kimsuky’s GoldDragon cluster and its C2 operations

August 18, 2022October 18, 2025 Securonix

Kimsuky’s GoldDragon cluster is a multi-stage operation targeting Korea-related entities, evolving rapidly with new infection chains and a layered C2 network. The campaign starts with spear-phishing and uses HTML Application (HTA), VBScript, and mshta to fetch…

Read More
Threat Research

AgentTesla is threatening businesses around the world with a new campaign – Avast Threat Labs

August 18, 2022October 16, 2025 Securonix

A phishing campaign spreading the AgentTesla information stealer targets businesses worldwide by sending spoofed emails with malicious disk images (.IMG/.ISO) named “Draft Contract”; the attack harvests browser and email credentials and other system data. A Po…

Read More

Posts pagination

Previous 1 … 460 461 462 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.