Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Threat Thursday: CryptBot Infostealer Masquerades as Cracked Software

March 3, 2022October 15, 2025 Securonix

CryptBot resurfaces as a streamlined infostealer distributed through compromised pirate sites offering cracked software and games. The latest variant trims its capabilities to focus on data exfiltration, using obfuscated scripts and a multi-stage delivery chai…

Read More
Threat Research

Threat advisory: Cybercriminals compromise users with malware disguised as pro-Ukraine cyber tools

March 2, 2022October 16, 2025 Securonix

Opportunistic cybercriminals are advertising cyber tools to target Russian entities, but the downloaded tools are actually infostealers that steal credentials and cryptocurrency data. The campaign leverages Telegram and sympathetic online spaces tied to the Ru…

Read More
Threat Research

Exploitation of VMware Horizon Servers by TunnelVision Threat Actor

March 2, 2022October 13, 2025 Securonix

eSentire documented a TunnelVision-linked intrusion into a VMware Horizon server, exploiting Log4Shell to harvest credentials and establish access. The operation included a backdoor DomainAdmin, PSExec/RDP lateral movement, C2 via activate-microsoft.cf, and Ng…

Read More
Threat Research

Infostealer Being Distributed via YouTube – ASEC BLOG

March 2, 2022October 16, 2025 Securonix

ASEC researchers uncovered an infostealer that is being distributed through YouTube disguised as a Valorant game hack, with instructions to disable anti-malware protections. The malware collects system information, browser credentials, cryptocurrency wallet fi…

Read More
Threat Research

Threat Advisory: Opportunistic cyber criminals take advantage of Ukraine invasion

March 2, 2022October 14, 2025 Securonix

Threat actors have exploited the Ukraine invasion with scam emails that solicit humanitarian aid and donations, often delivering malware or links to malicious pages. The activity mirrors opportunistic crime seen after other crises, combining social engineering…

Read More
Threat Research

Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups

March 2, 2022October 16, 2025 Securonix

Talos links MuddyWater to Iranian interests and describes a conglomerate of sub-groups conducting global campaigns using maldocs, PowerShell/VB/JavaScript tooling, and Windows RATs such as SloughRAT to achieve espionage, IP theft, and potentially ransomware an…

Read More
Threat Research

Qakbot injects itself into the middle of your conversations

March 2, 2022October 18, 2025 Securonix

Qakbot spreads by inserting malicious replies into ongoing email conversations, using compromised accounts to push a zip containing a malicious Office document. The malware is modular, downloads payloads, injects into system processes like Edge and Explorer, a…

Read More
Threat Research

double compromise in a single obfuscation

March 2, 2022October 20, 2025 Securonix

Researchers tracked a LazyScripter campaign in 2021 targeting European entities, revealing a double-compromise chain involving H-Worm and njRAT delivered via obfuscated scripts. They also uncovered use of a free online obfuscation service and a waterhole-style…

Read More
Threat Research

Raccoon Stealer: “Trash panda” abuses Telegram – Avast Threat Labs

March 1, 2022October 15, 2025 Securonix

Raccoon Stealer is a multifunctional stealer that uses Telegram to store and update its C2 addresses and to receive commands. Avast Threat Labs detail its data theft capabilities, distribution methods, and global prevalence, including locale checks to avoid ce…

Read More
Threat Research

Emotet Redux – Lumen

March 1, 2022October 16, 2025 Securonix

Black Lotus Labs notes Emotet’s resurgence since November 2021, with about 130,000 unique bots across 179 countries and evolving infrastructure that could serve as footholds or proxy C2s. The report highlights changes in encryption, process-list handling, and …

Read More
Threat Research

New RURansom Wiper Targets Russia

March 1, 2022October 15, 2025 Securonix

RURansom is a wiper targeting Russia, not a ransomware variant, as encryption is irreversible. It spreads like a worm via removable disks and mapped network shares, encrypting files and dropping a wiper note, while some versions exhibit geo-targeting and obfus…

Read More
Threat Research

Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments

February 28, 2022October 21, 2025 Securonix

APT41’s operations against U.S. state governments leveraged multiple, overlapping campaigns: initial access via a USAHerds web app vulnerability (CVE-2021-44207) followed by Log4Shell (CVE-2021-44228) deserialization to deploy backdoors, including KEYPLUG.LINU…

Read More
Threat Research

Fake Purchase Order Used to Deliver Agent Tesla | FortiGuard Labs 

February 28, 2022October 18, 2025 Securonix

FortiGuard Labs uncovered a phishing operation masquerading as a purchase order to a Ukrainian manufacturer, delivering Agent Tesla via a PPAM PowerPoint add-in. The campaign uses a multi-stage dropper with Bit.ly and MediaFire stages, ends with PowerShell-bas…

Read More
Threat Research

New Nokoyawa Ransomware Possibly Related to Hive

February 28, 2022October 15, 2025 Securonix

Trend Micro researchers present evidence that Nokoyawa ransomware is likely connected to Hive, sharing parts of the attack chain, tools, and even infrastructure, with most Nokoyawa targets in Argentina. The analysis also highlights similarities and key differe…

Read More
Threat Research

MS Office Files Involved Again in Recent Emotet Trojan Campaign – Part I | FortiGuard Labs 

February 28, 2022October 15, 2025 Securonix

Fortinet FortiGuard Labs analyzed a campaign that uses an MS Office Excel macro to deliver the Emotet Trojan, detailing how the macro writes and executes VBScript and PowerShell components to download and run a DLL payload. The research also covers anti-analys…

Read More

Posts pagination

Previous 1 … 482 483 484 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.