Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Robin Banks might be robbing your bank

July 26, 2022October 15, 2025 Securonix

Robin Banks is a phishing-as-a-service (PhaaS) platform that sells ready-made phishing kits targeting financial information for users in the U.S., U.K., Canada, and Australia. IronNet researchers observed a large-scale June 2022 campaign using Robin Banks to s…

Read More
Threat Research

Emotet Downloader Document Uses Regsvr32 for Execution

July 25, 2022October 18, 2025 Securonix

This analysis details how Emotet intrusion employs obfuscated Excel macros to download and run an Emotet loader, which is then executed via regsvr32 for payload deployment. It highlights how the loader stores an encrypted payload in its resources, uses a Windo…

Read More
Threat Research

A Detailed Analysis of the RedLine Stealer

July 25, 2022October 17, 2025 Securonix

RedLine Stealer is a data-collection malware distributed as cracked software that harvests browser data, cryptocurrency wallet credentials, and other applications, then exfiltrates the results via SOAP to a hard-coded C2 server. The report details its deployme…

Read More
Threat Research

Cyble – Fake Atomic Wallet Website Distributing Mars Stealer

July 25, 2022October 14, 2025 Securonix

Threat actors impersonate Atomic Wallet with a phishing site to deliver Mars Stealer, a credential-theft malware. The campaign uses a staged download chain, PowerShell, AES decryption, and a Discord-hosted payload that exfiltrates data to a C2 server. #MarsSte…

Read More
Threat Research

Manjusaka: A Chinese sibling of Sliver and Cobalt Strike

July 25, 2022October 14, 2025 Securonix

Cisco Talos uncovered Manjusaka, a new offensive framework advertised as an imitation of Cobalt Strike, featuring Rust-based implants for Windows and Linux and a Go-based C2 with a Simplified Chinese UI that can generate configured implants. A COVID-19 themed …

Read More
Threat Research

SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant

July 25, 2022October 16, 2025 Securonix

Trend Micro researchers analyze a new SolidBit variant that disguises itself as legitimate gaming/social apps on GitHub to lure victims and recruit ransomware-as-a-service affiliates. The campaign features multi-stage infection (Rust LoL Accounts Checker -> Lo…

Read More
Threat Research

Technical Analysis of Industrial Spy Ransomware

July 25, 2022October 18, 2025 Securonix

Industrial Spy is a relatively new ransomware group that emerged in April 2022, starting with data extortion and later adding encryption for double extortion. The group operates a dark web marketplace to exfiltrate and monetize stolen data, while its ransomwar…

Read More
Threat Research

Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoor | Qualys Security Blog

July 25, 2022October 13, 2025 Securonix

BPFDoor is a Linux/Unix backdoor that uses Berkeley Packet Filters (BPF) to filter data through sockets and support multiple C2 protocols (TCP, UDP, ICMP), enabling stealthy remote access. The BPFDoor campaign is attributed to the Chinese threat actor Red Mens…

Read More
Threat Research

IPFS: The New Hotbed of Phishing

July 24, 2022October 18, 2025 Securonix

IPFS is being used as a new platform for phishing, hosting content across a decentralized network and complicating takedowns. The article surveys IPFS phishing URLs, highlighting the services attackers abuse (Infura IPFS, Filebase/IPFS, NFT Storage, Surge.sh) …

Read More
Threat Research

Green Stone – InQuest

July 22, 2022October 16, 2025 Securonix

Two-sentence summary: A newly identified family of malicious documents from Iran, dubbed Green Stone, embeds an executable payload (nvidiax.exe) delivered via a macro and executes it after unpacking from base64-encoded content. The malware hides itself, gather…

Read More
Threat Research

A Convoluted Infection Chain Using Excel – InQuest

July 22, 2022October 15, 2025 Securonix

Two-sentence summary: An in-depth look at a convoluted infection chain embedded in an Excel document that lures users to enable macros, then unleashes a multi-stage payload across embedded worksheets. The campaign uses obfuscated .NET loaders (Tupak, Chimchim)…

Read More
Threat Research

SharpTongue Deploys Clever Mail-Stealing Browser Extension “SHARPEXT”

July 21, 2022October 18, 2025 Securonix

SHARPEXT is a clever post-exploitation browser extension used by SharpTongue (often associated with Kimsuky) to inspect and exfiltrate data from a victim’s webmail (Gmail and AOL) as users browse. The attackers deploy SHARPEXT by modifying browser preferences …

Read More
Threat Research

How to analyze Linux malware – A case study of Symbiote

July 21, 2022October 15, 2025 Securonix

Symbiote hooks libc and libpcap to hide its activity on Linux, including hiding processes, files, and network connections. It steals credentials from SSH/SCP by hooking the libc read function, encrypts them with RC4, stores them locally, and exfiltrates via DN…

Read More
Threat Research

Threat analysis: Follina exploit fuels ‘live-off-the-land’ attacks

July 21, 2022October 20, 2025 Securonix

Two-sentence summary: An in-depth analysis shows how the Follina exploit (CVE-2022-30190) is weaponized to achieve remote code execution via MSDT and to enable persistent, live-off-the-land attacker activity using native Windows tools. The report details three…

Read More
Threat Research

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike

July 21, 2022October 15, 2025 Securonix

Gootkit loader now employs more advanced fileless techniques to drop Cobalt Strike, using SEO-poisoned compromised websites and legal document templates to lure victims. The attack chain involves registry stuffing, memory-only execution via PowerShell, and a C…

Read More

Posts pagination

Previous 1 … 465 466 467 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.