Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Unknown APT group has targeted Russia repeatedly since Ukraine invasion

May 13, 2022October 17, 2025 Securonix

An unknown APT group has targeted Russian government entities with at least four spear-phishing campaigns since late February 2022, aiming to install a Remote Access Trojan that can monitor and control infected machines. The operation blends sophisticated anti…

Read More
Threat Research

Yashma Ransomware, Tracing the Chaos Family Tree

May 12, 2022October 13, 2025 Securonix

A BlackBerry Research & Intelligence analysis traces the Chaos ransomware family from its Chaos v1.0 origins to Yashma (Chaos v6.0), showing how Onyx emerged from Chaos v4.0 and how Yashma expands capabilities. The piece also covers spear-phishing activity tar…

Read More
Threat Research

Cyble – Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof Of Concept To Deliver Cobalt-Strike Beacon

May 12, 2022October 16, 2025 Securonix

Cyble researchers found a threat actor distributing fake PoCs for CVE-2022-26809 and CVE-2022-24500 on GitHub, targeting the Infosec community. The culprit malware is a .NET binary packed with ConfuserEX that displays fake exploit messages and then calls Power…

Read More
Threat Research

New Nokoyawa Variant Catching Up to Peers with Blatant Code Reuse | FortiGuard Labs 

May 12, 2022October 18, 2025 Securonix

Nokoyawa is a Windows ransomware variant that traces its lineage to Karma/Nemty and increasingly reuses publicly available code to expand its capabilities. FortiGuard Labs reports new features such as Babuk-derived process and volume-enumeration code, a TOR-ba…

Read More
Threat Research

Twisted Panda: Chinese APT espionage operation against Russian state-owned defense institutes – Check Point Research

May 11, 2022October 27, 2025 Securonix

Check Point Research details the Twisted Panda operation, a Chinese state-sponsored espionage campaign targeting Rostec’s defense institutes in Russia (and possibly Belarus), leveraging sanctions-based lures and novel tools like SPINNER and a multi-layer loade…

Read More
Threat Research

New ‘pymafka’ malicious package drops Cobalt Strike on macOS, Windows, Linux

May 11, 2022October 16, 2025 Securonix

Sonatype researchers detected a malicious Python package named “pymafka” on PyPI that typosquats the popular library PyKafka and delivers a Cobalt Strike beacon across Windows, macOS, and Linux. The package downloads platform-specific payloads from external IP…

Read More
Threat Research

Vidar distributed through backdoored Windows 11 downloads and abusing Telegram

May 11, 2022October 15, 2025 Securonix

ThreatLabz uncovered a campaign distributing Vidar infostealer via backdoored Windows 11 ISO downloads that spoof the official Windows 11 portal. The malware retrieves its C2 configuration from attacker-controlled social media channels on Telegram and Mastodon…

Read More
Threat Research

CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware

April 19, 2022October 15, 2025 Securonix

CrateDepression is a Rust crate supply-chain attack targeting Rust developers and GitLab CI pipelines, using a typosquatted dependency (rustdecimal) to drop a second-stage Go-based payload built on Mythic Poseidon. The campaign could enable larger-scale supply…

Read More
Threat Research

Emotet Being Distributed Using Various Files – ASEC BLOG

April 19, 2022October 15, 2025 Securonix

Emotet is being distributed through link files (.lnk) and Excel attachments, with distribution expanding since April. The emails disguise themselves as replies to the user to spread the malware, and the delivered payloads download additional loaders and malwar…

Read More
Threat Research

filesyncshell.dll劫持?APT-C-24响尾蛇最新攻击活动简报

April 19, 2022October 13, 2025 Securonix

Two sentences summarizing the article in English. APT-C-24 (Rattlesnake) unveiled a notably redesigned attack flow centered on FileSyncShell.dll, employing DLL side-loading via explorer.exe to achieve persistence and payload loading. The operation features two…

Read More
Threat Research

Lazarus Group Exploiting Log4Shell Vulnerability (NukeSped) – ASEC BLOG

April 18, 2022October 15, 2025 Securonix

Lazarus Group targeted Korea by exploiting the Log4j CVE-2021-44228 vulnerability on unpatched VMware Horizon to install NukeSped and related components. The operation includes NukeSped backdoors, INFOSTEALER, and Jin Miner modules, with data exfiltration and …

Read More
Threat Research

Bumblebee Malware from TransferXL URLs

April 18, 2022October 15, 2025 Securonix

EXOTIC LILY is observed distributing Bumblebee malware through TransferXL by sharing ZIP archives that contain ISO disk images. The infection chain includes mounting the ISO, running a Windows shortcut that launches a hidden DLL via rundll32, followed by Bumbl…

Read More
Threat Research

Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control | CISA

April 18, 2022October 17, 2025 Securonix

CISA warns that malicious actors linked to APT activity are exploiting CVE-2022-22954 and CVE-2022-22960 in VMware Workspace ONE Access and related products to achieve remote code execution and root-level access, chaining vulnerabilities for full system contro…

Read More
Threat Research

ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups

April 18, 2022October 18, 2025 Securonix

IBM X-Force researchers dissect ITG23’s crypter operations, revealing a sprawling ecosystem where ITG23 and partner groups crypt, distribute, and deploy malware across Trickbot, Emotet, IcedID, Qakbot, MountLocker, Gozi, and more. The findings show a highly co…

Read More
Threat Research

Emotet Summary: November 2021 Through January 2022

April 18, 2022October 16, 2025 Securonix

Emotet resurfaced in November 2021 after a law-enforcement takedown and by January 2022 had returned to prominence as an email-distributed threat with evolving delivery chains. The report covers infection patterns from November 2021 to January 2022, including …

Read More

Posts pagination

Previous 1 … 474 475 476 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.