Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

March 10, 2022October 16, 2025 Securonix

Cobalt Strike’s Beacon uses customizable Malleable C2 profiles to shape how it talks to its team server, enabling realistic emulation and evasion of detection. The article contrasts the default profile with customized profiles, showing how URI patterns, header…

Read More
Threat Research

New Ransomware Family Identified: LokiLocker RaaS Targets Windows Systems

March 10, 2022October 17, 2025 Securonix

BlackBerry Threat Intelligence identifies LokiLocker as a new RaaS ransomware family that encrypts Windows files using AES-256 and RSA-2048, with virtualization protection via KoiVM/NETGuard to hinder analysis. The campaign also features a possible false-flag …

Read More
Threat Research

DirtyMoe: Worming Modules – Avast Threat Labs

March 9, 2022October 15, 2025 Securonix

DirtyMoe’s worming module autonomously spreads by exploiting several known vulnerabilities and by generating target IPs based on geolocation, enabling mass-scale infection and lateral movement. This Avast Threat Lab analysis details the worm’s kill chain, the …

Read More
Threat Research

From BlackMatter to BlackCat: Analyzing two attacks from one affiliate

March 9, 2022October 15, 2025 Securonix

Talos analyzes how BlackCat/ALPHV operates as a growing ransomware-as-a-service with affiliates linked to prior groups like BlackMatter and DarkSide, outlining how the affiliates evolved the operation and used shared infrastructure. The piece details attack fl…

Read More
Threat Research

Qakbot infection with Cobalt Strike and VNC activity

March 9, 2022October 16, 2025 Securonix

A Windows host was infected with Qakbot (Qbot) on 2022-03-14, with Cobalt Strike and VNC remote-access activity appearing about 17 hours later. The incident highlights the obama166 distribution tag, the DLLs downloaded during infection, and notable changes in …

Read More
Threat Research

奇安信威胁情报中心

March 9, 2022October 22, 2025 Securonix

A Ukrainian-focused campaign linked to UNC1151 is analyzed, describing CHM-based loaders, obfuscated VBScript, and memory-resident backdoors that connect to C2 servers, echoing Ghostwriter/UNC1151 activity. The finding in…

Read More
Threat Research

Suspected Conti Ransomware Activity in the Auto Manufacturing Sector

March 9, 2022October 22, 2025 Securonix

Dragos reports sustained network chatter between Emotet C2 servers and multiple auto manufacturers, with the Emotet infrastructure suspected to be controlled by the Conti ransomware group. No confirmed initial access or encryption has been observed yet, and ac…

Read More
Threat Research

Cyclops Blink Sets Sights on Asus Routers

March 9, 2022October 14, 2025 Securonix

Trend Micro analyzes Cyclops Blink, a modular botnet linked to Sandworm that targets ASUS routers (and WatchGuard Firebox devices) and lists more than 150 current and historical C2 servers. The report details the malware’s architecture, encryption, and persist…

Read More
Threat Research

Gh0stCringe RAT Being Distributed to Vulnerable Database Servers – ASEC BLOG

March 8, 2022October 16, 2025 Securonix

Gh0stCringe (CirenegRAT) is a Gh0st RAT variant being spread to vulnerable MS-SQL and MySQL database servers, with detailed analyses showing its execution, persistence, and data-exfiltration behaviors. It targets poorly managed credentials, supports multiple m…

Read More
Threat Research

Cyble – Deep Dive Analysis – Pandora Ransomware

March 8, 2022October 13, 2025 Securonix

Cyble’s deep-dive into Pandora ransomware unveils its encryption behavior, links to ROOK-like TTPs, and notable anti-analysis and cleanup techniques. The analysis details a UPX-packed, C++-compiled payload that uses mutexes, privilege escalation, ETW/AMSI evas…

Read More
Threat Research

Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability | CISA

March 8, 2022October 14, 2025 Securonix

FBI and CISA warn that Russian state-sponsored cyber actors gained network access by exploiting default MFA configurations and the PrintNightmare vulnerability, enabling document exfiltration from an NGO via compromised credentials and MFA bypass. The advisory…

Read More
Threat Research

New Threat: B1txor20, A Linux Backdoor Using DNS Tunnel

March 8, 2022October 19, 2025 Securonix

B1txor20 is a Linux backdoor that uses DNS tunneling to build C2 channels, with features like a SOCKS proxy and remote rootkit installation. The article details its reverse analysis, BotID generation, DNS tunnel encoding/decoding, C2 communications, and a list…

Read More
Threat Research

Detecting EnemyBot – Securonix Initial Coverage Advisory

March 7, 2022October 16, 2025 Securonix

EnemyBot is a Linux-based botnet targeting a broad range of Linux devices with multi-architecture ELF payloads. The report details its infection chain, capabilities (network scanning, flooding, and data exfiltration), observed indicators of compromise, and mit…

Read More
Threat Research

Decoding a DanaBot Downloader

March 7, 2022October 16, 2025 Securonix

DanaBot is delivered via a VBS-based downloader that uses a distinctive obfuscation scheme and is associated with a social-engineering lure built around unclaimed property. The article also covers three methods to decode the VBS, noting DanaBot’s ties to the S…

Read More
Threat Research

OverWatch Uncovers Ongoing NIGHT SPIDER Zloader Campaign

March 4, 2022October 18, 2025 Securonix

OverWatch tracked a widespread intrusion campaign that used bundled .msi installers masquerading as legitimate software to download and execute NIGHT SPIDER’s Zloader trojan (and in some cases, Cobalt Strike). The defenders focused on anomalous behavior, low-p…

Read More

Posts pagination

Previous 1 … 481 482 483 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.