Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Enemybot: A Look into Keksec’s Latest DDoS Botnet | FortiGuard Labs

April 4, 2022October 14, 2025 Securonix

FortiGuard Labs observed a new DDoS botnet named Enemybot, attributed to Keksec, that borrows code from Gafgyt and Mirai while using obfuscation and a Tor-hidden C2 to complicate takedowns. It targets routers from Seowon Intech and D-Link and leverages a wide …

Read More
Threat Research

COVID-19 Phishing Campaign Targeting Companies | Cofense

April 1, 2022October 16, 2025 Securonix

A Cofense Phishing Defense Center report details a COVID-19 themed phishing campaign where threat actors impersonate companies to deploy fake COVID-19 forms and harvest credentials via online form builders. The campaign includes compromised sender addresses an…

Read More
Threat Research

New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns

April 1, 2022October 15, 2025 Securonix

SolarMarker has evolved into a multi-stage threat delivering backdoors and infostealers, primarily via SEO-driven campaigns that lure users to download malicious documents. Itexfiltrates browser data, can transfer files, and executes commands from a C2, while …

Read More
Threat Research

SystemBC Being Used by Various Attackers – ASEC BLOG

April 1, 2022October 13, 2025 Securonix

SystemBC is a proxy malware that has been used by various attackers for years, functioning as both a proxy bot and a downloader for additional payloads. It has recently been distributed through SmokeLoader and Emotet and has featured in ransomware campaigns, i…

Read More
Threat Research

CVE-2022-22965 Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware

March 30, 2022October 15, 2025 Securonix

Trend Micro Threat Research observed active exploitation of CVE-2022-22965 (Spring4Shell) enabling threat actors to weaponize and execute the Mirai botnet. The exploit chain drops Mirai in /tmp, changes permissions, and deploys a JSP web shell to execute comma…

Read More
Threat Research

FFDroider Stealer Targeting Social Media Platform Users

March 29, 2022October 13, 2025 Securonix

FFDroider is a Windows-based credential and cookie stealer that targets social media platforms by harvesting browser data and using stolen cookies to access accounts. ThreatLabz (Zscaler) details its delivery, obfuscation, registry persistence, C2 communicatio…

Read More
Threat Research

Cado Discovers Denonia: The First Malware Specifically Targeting Lambda

March 28, 2022October 15, 2025 Securonix

Cado Labs documents the first publicly-known malware designed to run specifically inside an AWS Lambda environment, named Denonia, which uses DNS over HTTPS for its command-and-control lookups and mines Monero via an embedded XMRig variant. This cloud-focused …

Read More
Threat Research

Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials

March 28, 2022October 19, 2025 Securonix

Cybereason Nocturnus details a new espionage campaign by APT-C-23 targeting Israeli officials, featuring upgraded malware (Barb(ie) Downloader, BarbWire Backdoor, and VolatileVenom Android implant) and sophisticated social engineering to gain initial access. T…

Read More
Threat Research

Parrot TDS takes over web servers and threatens millions – Avast Threat Labs

March 25, 2022October 17, 2025 Securonix

Parrot TDS is a pervasive traffic direction system that hijacks compromised web servers to deliver malicious campaigns such as FakeUpdate, reaching users worldwide. Avast Threat Labs notes it has been active since October 2021, with hundreds of thousands of us…

Read More
Threat Research

The Latest Remcos RAT Driven By Phishing Campaign | FortiGuard Labs

March 25, 2022October 14, 2025 Securonix

Fortinet FortiGuard Labs analyzes a phishing-driven Remcos RAT campaign that delivers a malicious Excel macro to Windows users, initiating a multi-stage VBS/PowerShell payload chain. The malware uses a decrypted configuration block, process hollowing into RegA…

Read More
Threat Research

Malicious Word Documents Using MS Media Player (Impersonating AhnLab) – ASEC BLOG

March 24, 2022October 16, 2025 Securonix

Malicious Word documents impersonating AhnLab are being distributed to corporate users to trigger macros. The attack chain downloads a second Word file containing a VBA macro, uses Windows Media Player to auto-run the code, downloads additional payloads, and p…

Read More
Threat Research

Colibri Loader combines Task Scheduler and PowerShell in clever persistence technique

March 24, 2022October 23, 2025 Securonix

Colibri Loader is a malware family that delivers and manages payloads onto infected PCs. A new campaign delivers Mars Stealer as the final payload, using a novel persistence technique that combines a scheduled task with PowerShell and a remote template injecti…

Read More
Threat Research

FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

March 24, 2022October 16, 2025 Securonix

FIN7’s intrusion landscape evolves from LOADOUT and GRIFFON in 2020 to POWERPLANT as the main PowerShell-based backdoor in 2021, with BEACON acting as a secondary access path and extensive PowerShell tradecraft continuing to shape their operations. The report …

Read More
Threat Research

Cicada: Chinese APT Group Widens Targeting in Recent Espionage Activity

March 24, 2022October 15, 2025 Securonix

Symantec details Cicada (a China-linked APT) widening its espionage activity, targeting governments and NGOs across multiple regions with Exchange server exploits, custom loaders, and backdoors such as Sodamaster and Mimikatz loader, plus tools like VLC and Wi…

Read More
Threat Research

Windows MetaStealer Malware – SANS Internet Storm Center

March 24, 2022October 17, 2025 Securonix

The diary documents a MetaStealer infection chain delivered via malicious Excel attachments that drop and persist a Windows EXE and DLL after macro execution and a VBScript loader. It also notes the malware abusing legitimate services like GitHub and transfer.…

Read More

Posts pagination

Previous 1 … 477 478 479 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.