Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Threat Actors Leveraging Microsoft Applications via DLL SideLoading – Detection & Response – Security Investigation

July 20, 2022October 16, 2025 Securonix

Threat actors abuse DLL sideloading to run malicious code through legitimate Microsoft applications (Teams and OneDrive), dropping and loading a malicious DLL that communicates with a remote C2 and leverages Cobalt Strike Beacon for post‑exploitation. The camp…

Read More
Threat Research

On the FootSteps of Hive Ransomware – Yoroi

July 20, 2022October 18, 2025 Securonix

Yoroi’s ZLab tracks Hive (TH-313) ransomware and its evolution from Go-based payloads to Rust-based variants under a Double Extortion/RaaS model, highlighting its expanding victimology including healthcare and critical infrastructure. The report details increa…

Read More
Threat Research

IcedID (Bokbot) with Dark VNC and Cobalt Strike

July 19, 2022October 16, 2025 Securonix

TA551/Monster Libra (aka SVCReady) has been distributing IcedID (Bokbot) alongside SVCReady since 2022, with campaigns that used password-protected archives and ISO images to drop malware and scripts. The infection chain led to DarkVNC activity and Cobalt Stri…

Read More
Threat Research

LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities

July 18, 2022October 14, 2025 Securonix

LockBit 3.0, dubbed LockBit Black, shows Clear borrowings from BlackMatter, including API harvesting, anti-debugging, and a suite of configuration flags that govern encryption and lateral movement. The variant deepens LockBit’s capabilities with BlackMatter-li…

Read More
Threat Research

CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit

July 18, 2022October 13, 2025 Securonix

CosmicStrand is a sophisticated UEFI firmware rootkit attributed to a Chinese-speaking threat actor, designed to persist from the earliest boot stages and deploy kernel- and user-mode payloads. It achieves durable persistence by implanting in firmware (CSMCORE…

Read More
Threat Research

Cyble – Luca Stealer Source Code Leaked On A Cybercrime Forum

July 16, 2022October 16, 2025 Securonix

Cyble Research Labs analyzed Luca Stealer, a Rust-based stealer targeting Chromium browsers, crypto wallets, chat apps, and games, whose source code leaked on a cybercrime forum in July 2022. Since then, the malware has seen multiple updates and wider adoption…

Read More
Threat Research

OODA: X-Ops Takes On Burgeoning SQL Server Attacks

July 15, 2022October 13, 2025 Securonix

Sophos X-Ops describes a coordinated Observe-Orient-Decide-Act loop among SophosLabs, SecOps, MTR, and Sophos AI to study and disrupt a wave of Microsoft SQL Server attacks leveraging old RCE CVEs and delivering Remcos or various ransomware families including …

Read More
Threat Research

The Return of Candiru: Zero-days in the Middle East – Avast Threat Labs

July 15, 2022October 16, 2025 Securonix

Avast Threat Labs uncovered a targeted zero-day in Google Chrome (CVE-2022-2294) used in the wild to attack Avast users in the Middle East, including Lebanese journalists. The campaign combined watering hole attacks, a Chrome WebRTC exploit chain, and a BYOVD …

Read More
Threat Research

Cyble – Qakbot Resurfaces With New Playbook

July 15, 2022October 16, 2025 Securonix

Cyble Research Labs uncovered a new Qakbot playbook that uses DLL sideloading and a multi-stage delivery chain, including HTML-embedded ZIPs and an ISO with a disguised LNK file to trigger execution. The campaign evolves with legitimate apps loading malicious …

Read More
Threat Research

YamaBot Malware Used by Lazarus – JPCERT/CC Eyes

July 7, 2022October 16, 2025 admin

YamaBot, linked to Lazarus, targets both Linux and Windows with HTTP-based C2 communication and RC4-based encoding for configuration and commands. The report details Linux and Windows variants, their C2 interactions, commands, and the infrastructure and hashes…

Read More
Threat Research

Cases of Attacks Targeting Vulnerable Atlassian Confluence Servers – ASEC BLOG

July 7, 2022October 13, 2025 Securonix

The ASEC analysis tracks attacks against vulnerable Atlassian Confluence Servers exploiting CVE-2021-26084 and CVE-2022-26134, leading to WebShell deployment and coin-mining payloads on unpatched systems. Multiple threat actors and malware families—such as 822…

Read More
Threat Research

Securonix Threat Labs Initial Coverage Advisory: STIFF#BIZON Detection Using Securonix – New Attack Campaign Observed Possibly Linked to Konni/APT37 (North Korea)

July 7, 2022October 16, 2025 Securonix

Threat researchers observed a new attack campaign named STIFF#BIZON targeting high-value targets in the Czech Republic, Poland, and other countries, with artifacts possibly linked to North Korea’s APT37 (Konni). The campaign uses a multi-stage infection chain …

Read More
Threat Research

Attackers target Ukraine using GoMet backdoor

July 7, 2022October 13, 2025 Securonix

Cisco Talos uncovered a GoMet backdoor campaign targeting a Ukrainian software development firm, with indicators pointing toward Russian state-sponsored actors or their interests. The GoMet variant is a modified open-source backdoor capable of cross-OS deploym…

Read More
Threat Research

Google ads lead to major malvertising campaign

July 7, 2022October 20, 2025 Securonix

Fraudsters abused Google’s ad network to redirect users searching for popular brands to a network of tech-support scam pages, effectively hijacking browser sessions through malvertising. The operation used cloaking, multi-stage redirects, and iframe-based brow…

Read More
Threat Research

I see what you did there: A look at the CloudMensis macOS spyware

July 6, 2022October 15, 2025 Securonix

CloudMensis is a macOS backdoor that spies on victims by exfiltrating documents, keystrokes, and screen captures, and communicates with its operators exclusively via public cloud storage services. It uses a two-stage architecture where the first stage download…

Read More

Posts pagination

Previous 1 … 466 467 468 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.