Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

TA416: Activity, Techniques, & Targeting Explained | Proofpoint US

February 25, 2022October 14, 2025 Securonix

Proofpoint researchers link TA416 to ongoing European-targeted campaigns using web bugs to profile victims before delivering PlugX payloads, with recent activity showing updates to the PlugX variant and its delivery chain. The operator impersonates diplomatic …

Read More
Threat Research

Phishers Spoof Power BI to Harvests Microsoft Credentials

February 18, 2022October 19, 2025 admin

Microsoft Power BI is being impersonated in a credential-harvesting campaign that uses realistic-looking notification emails and fake sign-in pages to collect Microsoft account credentials. The campaign leverages stolen credentials to create believable notific…

Read More
Threat Research

TeamTNT Cryptomining Explosion 🧨

February 11, 2022October 13, 2025 Securonix

TeamTNT is a prolific cryptomining threat actor that has targeted Linux servers for years, evolving from Redis to Docker and now Kubernetes-focused campaigns, with some Windows artifacts observed. The analysis details their TTPs, tools (including Tsunami, Rath…

Read More
Threat Research

深度剖析針對臺灣金融業的 Operation Cache Panda 組織型供應鏈攻擊

February 10, 2022October 18, 2025 Securonix

CyCraft’s first-hand investigation reveals a China-state-backed operation, dubbed “Operation Cache Panda,” targeting Taiwan’s financial sector through a broad supply-chain attack exploiting software vulnerabilities and deploying multi-stage, memory-resident ma…

Read More
Threat Research

Modified CryptBot Infostealer Being Distributed – ASEC BLOG

February 10, 2022October 13, 2025 Securonix

CryptBot’s latest version is distributed via deceptive crack/tool pages with redirect-heavy delivery, increasing infection risk. The update consolidates C2 communications, removes several infostealing features, and expands Chrome data theft to support newer br…

Read More
Threat Research

Threat Thursday: Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA

February 9, 2022October 15, 2025 Securonix

Arkei, a flexible information stealer, now expands to pilfer MFA data in addition to crypto-wallet information, using SmokeLoader as a deployment vector. Its configurable setup and use of legitimate components help it evade detection while exfiltrating data ba…

Read More
Threat Research

Cobalt Strike Being Distributed to Unsecured MS-SQL Servers – ASEC BLOG

February 9, 2022October 19, 2025 Securonix

Cobalt Strike is being distributed to unsecured MS-SQL servers, leveraging brute force, dictionary attacks, and command execution to deploy a memory-based beacon. The campaign overlaps with other malware like Lemon Duck, Kingminer, and Vollgar that abuse port …

Read More
Threat Research

Technical Analysis of the DDoS Attacks against Ukrainian Websites

February 9, 2022October 14, 2025 Securonix

Ukrainian banks and government websites were targeted by a moderate DDoS campaign attributed to the Katana botnet, a Mirai variant used to flood services. Preparation for the attack appears to have begun as early as February 13, with delivery through exploited…

Read More
Threat Research

Qbot and Zerologon Lead To Full Domain Compromise

February 9, 2022October 15, 2025 Securonix

In a November 2021 intrusion, threat actors gained a foothold with Qbot (Quakbot) and used Zerologon to elevate to domain admin, enabling Cobalt Strike deployment and broader network compromise. They conducted AD discovery, exfiltrated sensitive documents, and…

Read More
Threat Research

EvilPlayout: Attack Against Iran’s State Broadcaster – Check Point Research

February 9, 2022October 20, 2025 Securonix

A Check Point Research analysis uncovers a coordinated IRIB cyberattack (Jan 2022) that hijacked state TV/radio playout, deployed backdoors, and used a wiper to disrupt broadcasting. The report details tools like SimplePlayout, Winscreeny, HttpCallbackService,…

Read More
Threat Research

Log4j2 In The Wild | Iranian-Aligned Threat Actor “TunnelVision” Actively Exploiting VMware Horizon

February 9, 2022October 14, 2025 Securonix

SentinelLabs tracks TunnelVision, an Iranian-aligned threat actor cluster exploiting VMware Horizon and Log4j vulnerabilities to deploy backdoors, harvest credentials, and move laterally in the Middle East and the US. The operation heavily relies on tunneling …

Read More
Threat Research

PseudoManuscrypt Being Distributed in the Same Method as Cryptbot – ASEC BLOG

February 9, 2022October 13, 2025 Securonix

ASEC researchers trace PseudoManuscrypt distribution in Korea since May 2021, noting it masquerades as a Cryptbot-like installer and is spread via malicious sites surfaced in top search results for illegal software (Crack/Keygen). The malware uses NSIS to drop…

Read More
Threat Research

Remcos RAT Delivered Through Double Compressed Archive

February 8, 2022October 14, 2025 Securonix

Remcos RAT was delivered via a phishing email that attached a double-compressed archive, then unpacked to reveal an obfuscated VBScript dropper. The dropper uses a COM object (MSXML2.XMLHTTP.3.0) to fetch a Powershell-based payload and culminates in a Remcos p…

Read More
Threat Research

Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months | FortiGuard Labs

February 8, 2022October 16, 2025 Securonix

Fortinet FortiEDR uncovered a Moses Staff campaign targeting Israeli organizations, leveraging ProxyShell exploits to deploy web shells and a multi-component backdoor for espionage, data exfiltration, and payload delivery. The operation includes a loader that …

Read More
Threat Research

Meet Kraken: A New Golang Botnet in Development

February 8, 2022October 17, 2025 Securonix

Kraken is a developing Windows botnet written in Go that can download payloads, run commands, steal cryptocurrency wallets, and take screenshots, spreading via SmokeLoader. It uses UPX packing and Themida protection, persists via Run keys, and has evolved dash…

Read More

Posts pagination

Previous 1 … 483 484 485 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.