Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Cyble – Onyx Ransomware Renames Its Leak Site To “VSOP”

August 4, 2022October 13, 2025 Securonix

Cyble Research Labs analyzes Onyx ransomware, a .NET-based threat that uses double extortion, exfiltrating data before encryption and renaming its leak site to VSOP NEWS after a period of inactivity. The analysis highlights its encryption methods (.ampkcz exte…

Read More
Threat Research

Monero CoinMiner Being Distributed via Webhards – ASEC BLOG

August 3, 2022October 14, 2025 Securonix

Attackers distribute XMRig Monero CoinMiner via Korean webhards by disguising the miner as a game installer and bundling it with cracked software. The payload downloads xmrig.exe, config.json, and MsDtsServer.exe, installs a startup shortcut for persistence, a…

Read More
Threat Research

VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges

August 2, 2022October 15, 2025 Securonix

DeathStalker’s VileRAT campaign targets foreign exchange and cryptocurrency venues with a multi-stage infection chain, involving spearphishing, DOTM remote templates, VBA macro stomping, VileDropper and VileLoader loaders, and a Python-based VileRAT. The repor…

Read More
Threat Research

AitM Phishing Attack Targeting Enterprise Users of Gmail

August 2, 2022October 16, 2025 Securonix

ThreatLabz analyzes a large-scale AitM phishing campaign targeting enterprise Gmail/G Suite users, showing strong overlap with a prior Microsoft email-targeted attack. The operation used multi-stage URL redirection, client-side fingerprinting, and MFA-bypass c…

Read More
Threat Research

Raspberry Robin: Highly Evasive Worm Spreads over External Disks

August 2, 2022October 15, 2025 Securonix

Raspberry Robin is a worm that spreads via infected external disks and downloads its payload through msiexec from QNAP cloud accounts, using TOR for its C2 channel. It executes payloads via system binaries (rundll32.exe, shell32.dll) and elevates with fodhelpe…

Read More
Threat Research

APT-C-35: New Windows Framework Revealed

August 2, 2022October 16, 2025 Securonix

Morphisec Labs details DoNot Team (APT-C-35) updates to their Windows framework (YTY/Jaca), including new modules, a shellcode loader, and an upgraded browser stealer, with a focus on modular delivery and evasion techniques. The post also highlights infection …

Read More
Threat Research

#StopRansomware: Zeppelin Ransomware | CISA

August 2, 2022October 16, 2025 Securonix

The article compiles a large set of file hash indicators tied to Zeppelin ransomware activity as described in the CISA alert AA22-223a, associated with the StopRansomware campaign. It presents these indicators in a purely IOC-focused format without narrative d…

Read More
Threat Research

BlueSky Ransomware: Fast Encryption via Multithreading

August 2, 2022October 16, 2025 Securonix

BlueSky ransomware is an emerging Windows-focused family employing multithreading to speed up file encryption and evade defenses. The analysis ties BlueSky to Conti v3 in structure and network behavior, while its cryptography resembles Babuk (ChaCha20 with Cur…

Read More
Threat Research

Cisco Talos shares insights related to recent cyber attack on Cisco

August 1, 2022October 16, 2025 Securonix

Cisco Talos and CSIRT describe a May 2022 compromise in which a Cisco employee’s Google account credentials (synced from a personal browser) enabled initial VPN access after MFA bypass via vishing and MFA fatigue. The investigation links the actors to an initi…

Read More
Threat Research

Novel News on Cuba Ransomware: Greetings From Tropical Scorpius

August 1, 2022October 15, 2025 Securonix

Unit 42 analyzes Tropical Scorpius (UNC2596) activity, detailing Cuba Ransomware’s evolution with new tools like ROMCOM RAT, KerberCache, and a kernel driver to defeat defenses, plus its connection to the Industrial Spy marketplace. The report covers ransomwar…

Read More
Threat Research

Life After Death—SmokeLoader Continues to Haunt Using Old Vulnerabilities

August 1, 2022October 16, 2025 Securonix

SmokeLoader (Dofoil) continues to leverage aging vulnerabilities to deliver its payload via a crafted phishing email chain, decrypt an embedded OLE stream, and drop a final DLL payload that is associated with zgRAT. The campaign demonstrates how attackers rely…

Read More
Threat Research

Andariel deploys DTrack and Maui ransomware

August 1, 2022October 13, 2025 Securonix

Two sentences summarizing: This analysis confirms a Maui ransomware incident in 2022 attributed to Andariel, who deployed a DTrack variant about ten hours earlier on the same target. The operation appears global in scope, with a Japanese victim and overlaps to…

Read More
Threat Research

LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities

August 1, 2022October 13, 2025 Securonix

Threat actors repurpose Open Redirect vulnerabilities to bypass spam filters and deliver the LogoKit phishing content using trusted domains such as Snapchat and Google. LogoKit dynamically generates landing pages, steals credentials, and leverages compromised …

Read More
Threat Research

New HiddenAds malware affects 1M+ users and hides on the Google Play Store | McAfee Blog

July 29, 2022October 15, 2025 McAfee

Authored by Dexter Shin McAfee’s Mobile Research Team has identified new malware on the Google Play Store. Most of them…
The post New HiddenAds malware affects 1M+ users and hides on the Google Play Store appeared first on McAfee Blog….

Read More
Threat Research

BumbleBee Roasts Its Way to Domain Admin

July 29, 2022October 16, 2025 Securonix

An April 2022 intrusion saw BumbleBee act as the initial access loader, enabling multi-stage payloads and outbound C2 communication within a Windows environment. The operation featured credential dumping, Kerberoasting, privilege escalation tooling, and Cobalt…

Read More

Posts pagination

Previous 1 … 463 464 465 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.