Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Climbing Mount Everest: Black-Byte Bytes Back?

June 24, 2022October 13, 2025 Securonix

NCC Group analyzes Everest ransomware operations and argues a link to Black-Byte, detailing how Everest-related activity deployed during an incident response used TTPs such as RDP-based lateral movement, credential dumping, and C2 via remote tools. The report …

Read More
Threat Research

ApolloRat: Evasive Malware Compiled Using Nuitka – Cyble

June 24, 2022October 13, 2025 Securonix

ApolloRAT is a Python-based Remote Access Trojan that uses Discord as its C&C server. Cyble researchers note that the RAT is compiled with Nuitka to increase evasion and that threat actors are selling it for a low price on Telegram and their site. #ApolloRAT #…

Read More
Threat Research

Transparent Tribe begins targeting education sector in latest campaign

June 24, 2022October 14, 2025 Securonix

Cisco Talos reports a new campaign by the Transparent Tribe APT targeting Indian educational institutions, deploying CrimsonRAT to establish long-term access into victim networks. The operation also implicates a Pakistani hosting provider, Zain Hosting, as par…

Read More
Threat Research

When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors

June 23, 2022October 14, 2025 Securonix

Unit 42 analyzes Brute Ratel C4 (BRc4) activity tied to a Roshan_CV ISO, showing how a red-teaming tool can evade modern defenses and operate with nation-state-like tradecraft. The post covers the tool’s packaging, delivery via a LNK lure, in-memory execution,…

Read More
Threat Research

OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow

June 23, 2022October 16, 2025 Securonix

OrBit is a new undetected Linux threat that hijacks the execution flow by loading a malicious shared object and infects all running and upcoming processes. It provides remote SSH backdoor, harvests credentials, logs TTY commands, and persists via two methods (…

Read More
Threat Research

Cyble – NoMercy Stealer Adding New Features

June 22, 2022October 13, 2025 Securonix

Cyble Research Labs uncovered NoMercy stealer being sold on Telegram, primarily targeting Indian threat actors, with the developer rapidly adding new capabilities (including clipper and VPN client-stealer features). The stealer exfiltrates extensive host infor…

Read More
Threat Research

North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector | CISA

June 22, 2022October 16, 2025 Securonix

This joint Cybersecurity Advisory explains that Maui ransomware has been used by North Korean state-sponsored actors since May 2021 to target Healthcare and Public Health sector organizations, detailing TTPs and IOCs. It urges mitigations and reporting, and wa…

Read More
Threat Research

Bitter APT continues to target Bangladesh | SECUINFRA Falcon Team

June 22, 2022October 16, 2025 Securonix

Bitter (T-APT-17) continues to target Bangladesh, employing a multi-stage infection chain beginning with an Excel Maldoc that exploits CVE-2018-0798 to drop additional payloads. The operation culminates in Almond RAT, a .NET-based backdoor that uses AES-CBC en…

Read More
Threat Research

Securonix Threat Labs Initial Coverage Advisory: Analysis and Detection of BumbleBee Loader Using Securonix

June 22, 2022October 13, 2025 Securonix

BumbleBee is a new loader actively used to deliver payloads via phishing campaigns and to establish an initial foothold in target networks. The analysis highlights its living-off-the-land techniques, notably using a Microsoft-signed odbcconf.exe to indirectly …

Read More
Threat Research

Case of Attack Exploiting AnyDesk Remote Tool (Cobalt Strike and Meterpreter) – ASEC BLOG

June 22, 2022October 25, 2025 Securonix

MS-SQL servers are commonly targeted by attackers who gain control and install malware, including coin miners and ransomware. The article details a case where attackers deploy Cobalt Strike and Meterpreter on vulnerable MS-SQL servers to install AnyDesk for re…

Read More
Threat Research

Rise of LNK (Shortcut files) Malware | McAfee Blog

June 22, 2022October 14, 2025 McAfee

An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK…

Read More
Threat Research

Update: IconBurst npm software supply chain attack grabs data from apps and websites

June 21, 2022October 14, 2025 Securonix

Two sentences summarizing the content: ReversingLabs uncovered a widespread npm software supply chain attack where malicious JavaScript packages were published to steal form data from apps and websites. The campaign used typosquatting to impersonate legitimate…

Read More
Threat Research

DarkComet RAT Returns with New TTPS – Detection & Response – Security Investigation

June 21, 2022October 16, 2025 Securonix

DarkComet RAT has re-emerged with new TTPS-based detection and response coverage, highlighting its capabilities as a stealthy remote access Trojan that can spy on systems, steal credentials, and add infected machines to a botnet. The article outlines a multi-s…

Read More
Threat Research

VSingle malware that obtains C2 server information from GitHub – JPCERT/CC Eyes

June 21, 2022October 17, 2025 Securonix

VSingle, a Lazarus-linked malware, has been updated to fetch C2 server information from GitHub instead of relying solely on hard-coded C2 endpoints. The Linux variant uses wget for C2 communication, stores responses in /tmp/.sess_* files, and dynamically disco…

Read More
Threat Research

Cyble – Xloader Returns With New Infection Technique

June 21, 2022October 14, 2025 Securonix

Cyble Research Labs analyzed Xloader’s updated infection technique, detailing a multi-stage chain that starts with a phishing email delivering a PDF attachment, then traverses through embedded XLSX and an RTF-triggered dropper to load a final Xloader payload. …

Read More

Posts pagination

Previous 1 … 468 469 470 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.