Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

TA578 using thread-hijacked emails to push ISO files for Bumblebee malware

April 8, 2022October 16, 2025 Securonix

TA578, identified by Proofpoint as the threat actor behind the Contact Forms campaign, is pushing ISO files for Bumblebee malware through thread-hijacked emails. The analysis compares two May 2022 infection chains and notes similarities to the Contact Forms op…

Read More
Threat Research

APT34 targets Jordan Government using new Saitama backdoor

April 8, 2022October 16, 2025 Securonix

APT34 (OilRig/COBALT GYPSY) targeted Jordan’s government with a new backdoor called Saitama delivered via a malicious Excel macro. The backdoor uses DNS-based C2, a finite-state machine, and various anti-analysis and persistence techniques, indicating a target…

Read More
Threat Research

Bitter APT adds Bangladesh to their targets

April 7, 2022October 16, 2025 Securonix

Cisco Talos detects an ongoing Bitter APT operation targeting Bangladesh since August 2021, featuring a new Trojan called ZxxZ with remote file execution capabilities. The campaign employs spear-phishing with Office exploits and a C2 infrastructure that uses A…

Read More
Threat Research

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding

April 7, 2022October 18, 2025 Securonix

Cobalt Strike Beacon communicates with an external TeamServer to emulate long-term C2 activity, while using multiple encoding schemes to hide metadata in HTTP traffic. The post analyzes five encoding methods (Base64, Base64URL, NetBIOS, NetBIOSU, and Mask), ho…

Read More
Threat Research

Ursnif Malware Banks on News Events for Phishing Attacks | Qualys Security Blog

April 7, 2022October 14, 2025 Securonix

Ursnif is a long-running banking trojan that steals credentials, downloads other malware, and acts as a keylogger. It is primarily delivered via spear-phishing emails that impersonate authorities and exploit current events, using macro-enabled attachments and …

Read More
Threat Research

REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence

April 7, 2022October 16, 2025 Securonix

Secureworks CTU analyzed REvil samples tied to the GOLD SOUTHFIELD infrastructure, finding that the threat actor appears to be actively developing REvil and even has access to its source code. The March 2022 sample shows notable changes including updated strin…

Read More
Threat Research

Examining the Black Basta Ransomware’s Infection Routine

April 7, 2022October 15, 2025 Securonix

Black Basta’s infection routine is dissected, revealing how the ransomware relies on credential access, privilege escalation, and careful system manipulation to achieve encryption and extortion. The analysis also covers its methods for disabling recovery, alte…

Read More
Threat Research

Info-stealer Campaign targets German Car Dealerships and Manufacturers – Check Point Blog

April 7, 2022October 18, 2025 Securonix

Check Point uncovered a months-long targeted operation against German automotive entities, using ISO/HTA delivery to install MaaS info-stealers such as AZORult, BitRAT, and Raccoon. The attackers registered dozens of lookalike domains impersonating German car …

Read More
Threat Research

Lazarus Targets Chemical Sector

April 7, 2022October 16, 2025 Securonix

North Korea-linked Lazarus continues its Dream Job espionage campaign targeting chemical sector organizations, using fake job offers, Trojanized tools, and a multi-stage payload chain to infiltrate networks and steal intellectual property. Symantec’s findings …

Read More
Threat Research

Trends in the Recent Emotet Maldoc Outbreak | FortiGuard Labs

April 6, 2022October 14, 2025 Securonix

FortiGuard Labs details Emotet’s maldoc outbreak, showing a multi‑stage infection chain via malicious Office files that deploy VBA/Excel 4.0 macros to drop and run Emotet payloads. The campaign escalated from November 2021 through March 2022, with Excel docume…

Read More
Threat Research

Orion Threat Alert: Flight of the BumbleBee – Cynet

April 6, 2022October 15, 2025 Securonix

Orion Threat Research Team uncovered BumbleBee, a new loader used by Initial Access Brokers to deploy campaigns and inject Cobalt Strike into victims’ memory. The operation leverages spoofed identities and ISO-based delivery via TransferXL to lure users, with …

Read More
Threat Research

Fodcha, a new DDos botnet

April 6, 2022October 16, 2025 Securonix

Fodcha is a rapidly spreading DDoS botnet tracked by CNCERT and 360Netlab, with thousands of live bots and hundreds of victims, using ChaCha20 encryption and a dual C2 infrastructure. The malware propagates via NDay vulnerabilities and Telnet/SSH brute-force, …

Read More
Threat Research

Kaspersky report on Emotet modules and recent attacks

April 6, 2022October 20, 2025 Securonix

Emotet has evolved into a modular botnet capable of downloading up to 16 modules for credential theft, email harvesting, and spam delivery. The analysis covers its infection chain, module types (Process List, Mail PassView, WebBrowser PassView, Outlook/Thunder…

Read More
Threat Research

A Bad Luck BlackCat

April 5, 2022October 14, 2025 Securonix

BlackCat (ALPHV) is a Rust-based ransomware-as-a-service operation linked to BlackMatter and REvil lineage, notable for cross-platform samples and a sophisticated exfiltration workflow using Fendr/ExMatter. Telemetry suggests a close tie to past BlackMatter ac…

Read More
Threat Research

[Caution] Virus/XLS Xanpei Infecting Normal Excel Files – ASEC BLOG

April 4, 2022October 24, 2025 Securonix

The ASEC analysis details Excel-based malware campaigns that infect normal Excel files via VBA and can also act as downloaders or perform DNS spoofing. The malware drops components into the Excel startup path to auto-execute on Excel launch, enabling additiona…

Read More

Posts pagination

Previous 1 … 476 477 478 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.