Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Translating Saitama’s DNS tunneling messages

June 3, 2022October 16, 2025 Securonix

Saitama is a backdoor that uses DNS tunneling to encapsulate its C2 messages, hiding commands within IPv4 addresses. The activity has been linked to APT34 and was observed in a phishing email targeting Jordan’s foreign ministry; Morphus Labs also released a tr…

Read More
Threat Research

Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials – Check Point Research

June 3, 2022October 15, 2025 Securonix

Two sentences summarizing: Check Point Research exposes an Iranian-backed spear-phishing operation targeting former Israeli officials and other high-ranking figures, leveraging a custom phishing infrastructure and inbox takeovers to steal credentials and ident…

Read More
Threat Research

eSentire Threat Intelligence Malware Analysis: Purple Fox

June 2, 2022October 13, 2025 Securonix

Purple Fox malware evolved from an exploit kit used by RIG EK into an independent threat that deploys a multi-stage, stealthy infection chain featuring a rootkit, LOLBIN abuse, and privilege escalation via public CVEs. The analysis maps observed behaviors to M…

Read More
Threat Research

How SeaFlower č—ęµ·čŠ± installs backdoors in iOS/Android web3 wallets to steal your seed phrase

June 2, 2022October 17, 2025 Securonix

SeaFlower is a highly sophisticated intrusion set that targets web3 wallets by delivering backdoored iOS/Android apps, injecting covert code to exfiltrate seed phrases and balances. It uses provisioning-based sideloading, dylib injections, React Native bundle …

Read More
Threat Research

Technical Analysis of PureCrypter: A Fully-Functional Loader Distributing Remote Access Trojans and Information Stealers

June 2, 2022October 15, 2025 Securonix

PureCrypter is a fully featured loader sold since 2021 that distributes a range of remote access trojans and information stealers. It uses a .NET-based, obfuscated, and encrypted delivery chain with protobuf-configured options for persistence, injection, and d…

Read More
Threat Research

Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild – Avast Threat Labs

June 1, 2022October 13, 2025 Securonix

Avast researchers document Syslogk, a Linux kernel rootkit under development in the wild that leverages Adore-Ng foundations to hide itself and a Rekoobe backdoor embedded in a fake SMTP server. The malware can be revealed, loaded, and controlled via on-demand…

Read More
Threat Research

Taking down the IP2Scam tech support campaign

May 31, 2022October 15, 2025 Securonix

IP2Scam tech support campaigns use malvertising to push visitors to browser locker pages. The operators rotate infrastructure and impersonate brands to misdirect users, while researchers tracked the activity and coordinated takedown efforts with hosting provid…

Read More
Threat Research

GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool

May 31, 2022October 13, 2025 Securonix

Unit 42 identifies PingPull, a new remote access Trojan used by the GALLIUM group, expanding its targeting beyond telecommunications to financial institutions and government entities across multiple regions. PingPull supports three C2 channels (ICMP, HTTP(S), …

Read More
Threat Research

Crypto-Miners Leveraging Atlassian Zero-Day Vulnerability – Check Point Blog

May 31, 2022October 18, 2025 Securonix

Two security researchers describe how crypto-mining operations leveraged Atlassian Confluence zero-day CVE-2022-26134 to drop and execute mining payloads on Linux and Windows hosts, using a multi-stage chain from initial exploitation to persistence and lateral…

Read More
Threat Research

Exposing HelloXD Ransomware and x4k

May 30, 2022October 16, 2025 Securonix

HelloXD is a ransomware family performing double extortion on Windows and Linux, with negotiations conducted via TOX chat and onion-based services instead of a leak site. Unit 42’s analysis links HelloXD to x4k and reveals details on its packers, memory-based …

Read More
Threat Research

Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat

May 28, 2022October 16, 2025 Securonix

Symbiote is a highly evasive Linux threat that infects running processes by loading as a shared object via LD_PRELOAD to gain rootkit capabilities and remote access. Researchers describe its stealthy behavior—hiding itself and other malware, evading live foren…

Read More
Threat Research

Lyceum .NET DNS Backdoor

May 27, 2022October 15, 2025 Securonix

Lyceum Group, an Iranian state-sponsored APT, deployed a new .NET DNS backdoor (DnsSystem) in campaigns targeting the Middle East, delivered via a macro-enabled Word document and attacker-controlled DNS. The backdoor communicates over DNS (TXT and A records) t…

Read More
Threat Research

Credit card skimmer evades Virtual Machines

May 27, 2022October 17, 2025 Securonix

Threat actors behind a Magecart skimmer use in-browser virtual-machine detection via WebGL to distinguish real victims from researchers or sandboxes. If the machine passes the check, the skimmer exfiltrates sensitive data by a single POST while employing obfus…

Read More
Threat Research

Internet Storm Center Diary 2024-05-22

May 27, 2022October 15, 2025 Securonix

An ISC guest diary analyzes the modern coin miner malware variant “redtail” and its capabilities across four CPU architectures, showing how attackers gain initial SSH access, upload payloads, and establish persistence on compromised hosts. The report traces tw…

Read More
Threat Research

MakeMoney malvertising campaign adds fake update template

May 27, 2022October 13, 2025 Securonix

A malvertising-driven campaign now pushes a fake Firefox update, a lookalike of FakeUpdates (SocGholish), delivering an encrypted payload via a simple loader that drops adware. The infrastructure reuse and long-running MakeMoney gates highlight persistent attr…

Read More

Posts pagination

Previous 1 … 471 472 473 … 489 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.