Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Avos ransomware group expands with new attack arsenal

June 9, 2022October 15, 2025 Securonix

Talos observed a month-long AvosLocker campaign leveraging Sliver, Cobalt Strike, and network scanners to move laterally after exploiting Log4Shell on exposed VMware Horizon UAG appliances. The incident underscores the importance of properly configured securit…

Read More
Threat Research

Cybercriminals Use Azure Front Door in Phishing Attacks

June 9, 2022October 16, 2025 Securonix

Phishing content is increasingly delivered via Azure Front Door, with attackers using lookalike domains to harvest credentials from multiple major services. They rely on compromised email accounts to spread targeted phishing, impersonating brands like SendGrid…

Read More
Threat Research

Resurgence of Voicemail-themed Phishing Attacks Targeting Key Industry Verticals in US

June 9, 2022October 14, 2025 Securonix

ThreatLabz has tracked a voicemail-themed credential phishing campaign since May 2022 targeting US-based organizations across multiple verticals to steal Office365 and Outlook credentials. The operation shows overlap with a 2020 voicemail campaign and uses tar…

Read More
Threat Research

New IceXLoader 3.0 – Developers Warm Up to Nim | FortiGuard Labs

June 8, 2022October 16, 2025 Securonix

IceXLoader is a Nim-based commercial loader promoted in malware forums to download and deploy additional payloads on Windows machines, with ties to NimzaLoader used by the TrickBot group. The article outlines IceXLoader v3.0’s technical behavior, potential del…

Read More
Threat Research

Malspam pushes Matanbuchus malware, leads to Cobalt Strike

June 8, 2022October 15, 2025 Securonix

On 2022-06-16, researchers observed a malspam wave delivering Matanbuchus via a ZIP that contains an HTML page which decodes and downloads payloads, ultimately triggering Cobalt Strike beacons. The operation uses a signed MSI, base64-encoded payloads, and HTTP…

Read More
Threat Research

Raccoon Stealer is Back with a New Version

June 8, 2022October 14, 2025 Securonix

Raccoon Stealer has returned with a new V2 version, resuming activity after a pause linked to a key developer’s death. The update introduces a more automated, faster builder/admin panel, and a Cracked Software distribution approach, with ongoing monitoring adv…

Read More
Threat Research

Websites Hosting Fake Cracks Spread Updated CopperStealer Malware

June 8, 2022October 16, 2025 Securonix

Trend Micro analyzes updated CopperStealer samples that spread via fake cracks on websites, detailing a two-stage dropper, browser data theft, and a revamped C2 setup. The report highlights code reuse, a DES-based encryption scheme, UPX-packed components, Tele…

Read More
Threat Research

Client-side Magecart attacks still around, but more covert

June 8, 2022October 20, 2025 Securonix

Magecart client-side attacks are still active but appear more covert, with researchers tracing new anti-VM infrastructure and noting visibility risks if operators move to server-side skrimming. The investigation links two newly reported anti-VM skimmer domains…

Read More
Threat Research

Malicious HWP Files with BAT Scripts Being Distributed Actively (North Korea/National Defense/Broadcasting) – ASEC BLOG

June 7, 2022October 13, 2025 Securonix

ASEC’s analysis identifies active distribution of malicious HWP files that exploit an OLE object insertion feature to run a batch file, with PowerShell injecting shellcode into a normal process. The campaigns target national defense, North Korea–related materi…

Read More
Threat Research

Cyble – Cerber2021 Ransomware Back In Action

June 7, 2022October 16, 2025 Securonix

Cerber2021 ransomware has resurfaced, delivered via exploitation of patched/unpatched vulnerabilities to target Confluence and Gitlab servers, then encrypts files on Windows and Linux with a Tor-based ransom site. The analysis details file encryption behavior,…

Read More
Threat Research

QBot returns with new TTPS – Detection & Response – Security Investigation

June 7, 2022October 13, 2025 Securonix

QBot (QakBot) is a long-standing banking trojan that steals credentials and is spread via spam emails with macro-enabled Office documents. The article highlights two recent distribution methods (XLSB with hidden payload sheets and XLTM macro templates), detail…

Read More
Threat Research

DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach

June 6, 2022October 16, 2025 Securonix

Volexity details a targeted Sophos Firewall breach that leveraged a zero-day remote code execution vulnerability (CVE-2022-1040) to install a webshell, establish persistence, and conduct MITM activity that extended to external systems such as CMS websites. Sop…

Read More
Threat Research

Cyble – Hydra Android Malware Distributed Via Play Store

June 6, 2022October 13, 2025 Securonix

Cyble Research Labs identified an Android malware variant distributed via the Play Store that acts as a Hostile Downloader to fetch the Hydra Banking Trojan. The app masquerades as Document Manager, uses fake update prompts, and communicates with a TOR-enabled…

Read More
Threat Research

Telerik UI exploitation leads to cryptominer, Cobalt Strike infections

June 5, 2022October 19, 2025 Securonix

An unknown threat actor exploits CVE-2019-18935 in Telerik UI for ASP.NET AJAX to seize control of Windows servers, drop a Cobalt Strike beacon, and stage further malware via PowerShell commands. Sophos MTR links these campaigns to earlier Blue Mockingbird act…

Read More
Threat Research

Detect the Follina MSDT Vulnerability (CVE-2022-30190) with Qualys Multi-Vector EDR & Context XDR | Qualys Security Blog

June 3, 2022October 14, 2025 Securonix

Follina (CVE-2022-30190) is a remote code execution vulnerability in Microsoft Office that can be exploited without macros by loading an external reference which ultimately invokes the MSDT tool to run PowerShell. The article outlines the attack flow, the tech…

Read More

Posts pagination

Previous 1 … 470 471 472 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.