Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact

June 20, 2022October 13, 2025 Securonix

SessionManager is an IIS backdoor tied to the GELSEMIUM activity cluster that persists on compromised servers by loading a malicious IIS module after ProxyLogon-type exploits. It enables reading/writing files, remote command execution, and HTTP-based command-a…

Read More
Threat Research

YTStealer Malware: “YouTube Cookies! Om Nom Nom Nom”

June 17, 2022October 15, 2025 Securonix

YTStealer is a YouTube authentication cookie stealer marketed on the dark web, designed to harvest credentials and channel data from creators. It evades analysis with sandbox checks, uses headless browser automation to validate cookies and collect YouTube Stud…

Read More
Threat Research

Cyble – PennyWise Stealer: An Evasive Infostealer Leveraging YouTube To Infect Users

June 17, 2022October 15, 2025 Securonix

Cyble Research Labs uncovered PennyWise, a new evasive infostealer that targets 30+ Chrome-based and 5+ Mozilla-based browsers as well as crypto wallets, with updated version 1.3.4 already observed in the wild. The malware is distributed via YouTube campaigns …

Read More
Threat Research

Raccoon Stealer v2 – Part 1: The return of the dead

June 17, 2022October 16, 2025 Securonix

Raccoon Stealer v2 marks a notable revival of the information stealer brand, with early signs of life detected in 2022 as servers and administration panels surfaced. SEKOIA.IO documents a refreshed build, renewed distribution, and a plan to scale behind a rede…

Read More
Threat Research

Ukraine Targeted by Dark Crystal RAT (DCRat) | FortiGuard Labs

June 16, 2022October 14, 2025 Securonix

Two Ukrainian targets were hit by emails delivering malicious documents that leveraged a Follina-like vulnerability and malicious macros to drop a DCRat variant. FortiGuard Labs notes the campaign revolves around Dark Crystal RAT (DCRat) with multi-stage infec…

Read More
Threat Research

Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs

June 16, 2022October 15, 2025 Securonix

ReversingLabs reports AstraLocker 2.0 is distributed directly from Microsoft Word phishing documents, leveraging leaked Babuk code and a “smash and grab” approach for rapid impact. The campaign uses an old packer, anti-analysis checks, and Monero/BTC wallets f…

Read More
Threat Research

New Info-stealer Disguised as Crack Being Distributed – ASEC BLOG

June 16, 2022October 16, 2025 Securonix

Two sentences: The ASEC analysis covers a new info-stealer distribution campaign branded as “Recordbreaker Stealer,” which began in earnest around May 20 and is spread by disguising itself as software cracks/installers. It may be a new version of Raccoon Steal…

Read More
Threat Research

Return of the Evilnum APT with updated TTPs and new targets

June 16, 2022October 16, 2025 Securonix

ThreatLabz tracks Evilnum APT activity from early 2022, noting a shift to targeted campaigns in UK/Europe FinTech and expanded targets including an intergovernmental migration organization. The updated campaign uses document template injection in MS Office Wor…

Read More
Threat Research

Black Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit

June 16, 2022October 15, 2025 Securonix

Black Basta expanded its repertoire by employing QakBot as an entry point and using the PrintNightmare flaw to perform privileged file operations. It also leveraged the Coroxy backdoor and Netcat for lateral movement across networks. #BlackBasta #QakBot

Read More
Threat Research

Socgholish to Cobalt Strike in 10 Minutes

June 15, 2022October 15, 2025 Securonix

eSentire’s TRU team uncovered Socgholish, a drive-by social engineering threat that delivers a fake software update, leading to quick Cobalt Strike deployment and persistence. The case highlights how drive-by infections can escalate to hands-on-keyboard intrus…

Read More
Threat Research

MuddyWater’s “light” first-stager targeting Middle East

June 13, 2022October 15, 2025 Securonix

MuddyWater has maintained a long-term infection campaign targeting Middle East countries since late 2020, with recent samples suggesting it may still be active. The campaign centers on compressed attachments containing Word documents with VBA macros that drop …

Read More
Threat Research

Instagram credentials Stealers: Free Followers or Free Likes | McAfee Blog

June 11, 2022October 13, 2025 McAfee

Authored by Dexter Shin  Instagram has become a platform with over a billion monthly active users. Many of Instagram’s users…
The post Instagram credentials Stealers: Free Followers or Free Likes appeared first on McAfee Blog….

Read More
Threat Research

Instagram credentials Stealer: Disguised as Mod App | McAfee Blog

June 11, 2022October 15, 2025 McAfee

Authored by Dexter Shin  McAfee’s Mobile Research Team introduced a new Android malware targeting Instagram users who want to increase…
The post Instagram credentials Stealer: Disguised as Mod App appeared first on McAfee Blog….

Read More
Threat Research

Cyble – Quantum Software:  LNK File-based Builders Growing In Popularity

June 10, 2022October 18, 2025 Securonix

Cyble Research Labs highlights a rise in using Windows .lnk shortcut files to deliver payloads via LOLBins like PowerShell and mshta, including a new “Quantum Builder” tool that can create .lnk, .hta, and .iso-based payloads. The report also notes potential La…

Read More
Threat Research

ToddyCat: Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia

June 10, 2022October 13, 2025 Securonix

ToddyCat is a recently identified APT that uses two previously unknown tools, Samurai backdoor and Ninja Trojan, to target high-profile entities in Europe and Asia since December 2020. The operation began with Exchange server compromises and a China Chopper we…

Read More

Posts pagination

Previous 1 … 469 470 471 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.