Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Lightning Framework: New “Swiss Army Knife” Linux Malware

July 6, 2022October 14, 2025 Securonix

Lightning Framework is a modular, undetected Linux malware framework with a downloader, core, and multiple plugins, including rootkit-capable components, that can communicate with a threat actor via a malleable C2 configuration. It leverages typosquatting, per…

Read More
Threat Research

LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques

July 6, 2022October 14, 2025 Securonix

LockBit 3.0 (aka LockBit Black) is an evolved ransomware capable of aggressive anti-analysis and evasion, rapid encryption, and expanded data-leak and affiliate-management features. The piece provides a technical dive into its payload behavior, persistence, ge…

Read More
Threat Research

Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities | Proofpoint US

July 6, 2022October 14, 2025 Securonix

TA4563 is a threat actor using the EvilNum backdoor to target European DeFi, cryptocurrency, and forex entities, with campaigns evolving in how they deliver the malware and evade defenses. EvilNum functions as a backdoor for data theft and loading additional p…

Read More
Threat Research

I see what you did there: A look at the CloudMensis macOS spyware

July 6, 2022October 15, 2025 Securonix

CloudMensis is a macOS backdoor that spies on victims by exfiltrating documents, keystrokes, and screen captures, and communicates with its operators exclusively via public cloud storage services. It uses a two-stage architecture where the first stage download…

Read More
Threat Research

New Variant of QakBot Being Spread by HTML File Attached to Phishing Emails

July 5, 2022October 17, 2025 Securonix

Fortinet’s FortiGuard Labs documented a phishing campaign delivering a new QakBot variant via an attached HTML file that auto-executes to drop a ZIP, load a loader, and ultimately run QakBot within a Windows process. The analysis details the infection chain fr…

Read More
Threat Research

NukeSped RAT Report – CYFIRMA

July 4, 2022October 16, 2025 Securonix

NukeSped RAT is a Windows-based remote access trojan attributed to the Lazarus Group that uses phishing Word documents with malicious macros to drop staged payloads. It exfiltrates data, captures keystrokes and screenshots, and downloads additional payloads, e…

Read More
Threat Research

Amadey Bot Being Distributed Through SmokeLoader – ASEC BLOG

July 4, 2022October 15, 2025 Securonix

Amadey Bot is a information-stealing malware that also acts as a downloader for additional payloads when commanded by a C2 server, and it has been spread via SmokeLoader as part of downloader activity. It targets systems through disguise in software cracks, th…

Read More
Threat Research

Cyble – Redeemer Ransomware Back Action

July 1, 2022October 16, 2025 Securonix

Cyble Research Labs analyzes Redeemer 2.0, a ransomware variant distributed via an affiliate program that shares 20% of victims’ Monero ransom with affiliates and uses a builder to tailor campaigns. Redeemer 2.0 adds an affiliate toolkit, GUI-based decrypter, …

Read More
Threat Research

From the Front Lines | 8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts

June 30, 2022October 14, 2025 Securonix

Over the last month a crimeware group best known as 8220 Gang has expanded their botnet to roughly 30,000 hosts globally through Linux vulnerabilities and poorly secured configurations. The infection script, IRC botnet, and updated PwnRig cryptocurrency miner …

Read More
Threat Research

Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems | CISA

June 30, 2022October 15, 2025 Securonix

Cyber threat actors, including state-sponsored APT groups, continue to exploit CVE-2021-44228 (Log4Shell) in unpatched VMware Horizon and Unified Access Gateway (UAG) servers to gain initial access and move laterally within organizations. They deploy loader ma…

Read More
Threat Research

GeckoSpy: Pegasus Spyware Used against Thailand’s Pro-Democracy Movement – The Citizen Lab

June 29, 2022October 16, 2025 Securonix

Pegasus spyware was used against Thailand’s pro-democracy movement, with at least 30 civil society victims infected between October 2020 and November 2021, triggering Apple security notifications in November 2021 and a collaborative forensic investigation. The…

Read More
Threat Research

Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive

June 28, 2022October 14, 2025 Securonix

Researchers document Cloaked Ursa (APT29) campaigns that weaponize trusted cloud storage services to hide malware delivery, notably Dropbox and Google Drive. The campaigns deploy EnvyScout HTML droppers to fetch Agenda.iso payloads and use Google Drive-based e…

Read More
Threat Research

Shortcut-based (LNK) attacks delivering malicious code on the rise

June 28, 2022October 16, 2025 Securonix

Resecurity reports attackers are increasingly using tools to generate malicious shortcut files (.LNK) for payload delivery, with MLNK Builder 4.2 adding AV evasion and icon masquerading. Campaigns by APT groups and cybercriminals—including Bumblebee Loader and…

Read More
Threat Research

Digium Phones Under Attack: Insight Into the Web Shell Implant

June 28, 2022October 16, 2025 Securonix

Unit 42 describes a campaign targeting Elastix/Digium phones where a PHP web shell is implanted to exfiltrate data and fetch additional payloads. The activity links to a Rest Phone Apps RCE (CVE-2021-45461) and is mitigated by Palo Alto Networks WildFire and T…

Read More
Threat Research

PSA: Sudden Increase In Attacks On Modern WPBakery Page Builder Addons Vulnerability

June 27, 2022October 13, 2025 Securonix

Two sentences: Wordfence reports a surge of attacks targeting Kaswara Modern WPBakery Page Builder Addons exploiting CVE-2021-24284 to upload PHP files and take over sites; the plugin is closed with no patch available, leaving all versions affected. Wordfence …

Read More

Posts pagination

Previous 1 … 467 468 469 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.