Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

ModifiedElephant APT and a Decade of Fabricating Evidence

February 7, 2022October 16, 2025 Securonix

ModifiedElephant is a decade-long threat actor targeting India-based human rights activists, defenders, academics, and lawyers to plant incriminating digital evidence for arrests. The group relies on spearphishing with publicly available remote access trojans …

Read More
Threat Research

New Emotet Infection Method

February 4, 2022October 14, 2025 Securonix

Unit 42 outlines a renewed Emotet infection method that uses an Excel 4.0 macro in a phishing email to stage PowerShell payloads and finally deliver the Emotet binary. The approach relies on obfuscated macros, a highly obfuscated HTML application, and multiple…

Read More
Threat Research

+380-GlowSpark – InQuest

February 4, 2022October 18, 2025 Securonix

GlowSpark is a multi-stage maldoc campaign linked to Actinium, using legitimate-looking documents and targeted delivery to infect Ukrainian/Eastern European targets. The operation relies on obfuscated Visual Basic scripts, sandbox evasion, and selectively deli…

Read More
Threat Research

ShadowPad Malware Analysis

February 4, 2022October 20, 2025 Securonix

ShadowPad is an advanced modular RAT deployed by Chinese government–sponsored actors since at least 2017, with broader activity by MSS and PLA-linked groups globally since 2019. CTU analysis shows ShadowPad uses in-memory decryption, DLL loaders sideloaded by …

Read More
Threat Research

TA2541: Threats to Aviation, Aerospace, & Travel | Proofpoint US

February 3, 2022October 15, 2025 Securonix

Proofpoint details TA2541, a persistent cybercrime actor targeting aviation, aerospace, transportation, manufacturing, and defense sectors since 2017, primarily deploying remote access trojans (RATs) such as AsyncRAT. The group uses aviation- and travel-themed…

Read More
Threat Research

Lockbit 2.0 Ransomware: TTPs Used in Emerging Ransomware Campaigns

February 3, 2022October 18, 2025 Picussecurity

Picus Security analyzes LockBit 2.0 ransomware, detailing its evolution as a RaaS operator, its anti-detection techniques, and its methods to disrupt victim recovery and logging. The post also lists IOCs and maps LockBit 2.0 behaviors to MITRE ATT&CK technique…

Read More
Threat Research

NFT Lure Used to Distribute BitRAT | FortiGuard Labs

February 3, 2022October 21, 2025 Securonix

FortiGuard Labs details an NFT-themed lure that hides a BitRAT infection in an Excel XLSM file, downloaded via Discord and executed through a malicious macro. The malware chain includes batch and PowerShell steps, a .NET downloader, DLL injection, persistence,…

Read More
Threat Research

A Modern Ninja: Evasive Trickbot Attacks Customers of 60 High-Profile Companies – Check Point Research

February 2, 2022October 16, 2025 Securonix

Check Point Research analyzes TrickBot’s modular architecture and anti-analysis techniques, highlighting how TrickBot targeted customers of 60 high-profile financial and tech companies using web-injects and credential theft. The article describes key modules l…

Read More
Threat Research

NaturalFreshMall: a Magento Mass Hack

February 2, 2022October 17, 2025 Securonix

Sansec tracked a mass Magento 1 compromise affecting hundreds of stores, with about 374 stores infected in a single day as part of a broader breach impacting 500+ shops. Attackers loaded a payment skimmer from naturalfreshmall.com and left numerous backdoors a…

Read More
Threat Research

Cybereason vs. Lorenz Ransomware

February 1, 2022October 15, 2025 Securonix

Lorenz ransomware has evolved with customized attacks against organizations worldwide, often demanding large ransom fees. Cybereason links Lorenz to ThunderCrypt and notes that while a No More Ransom decryptor exists, it is limited and often ineffective. #Lore…

Read More
Threat Research

What’s with the shared VBA code between Transparent Tribe and other threat actors?

February 1, 2022October 13, 2025 Securonix

Researchers link VBA-based samples to threat actors in South Asia, showing code reuse across groups such as Transparent Tribe, SideCopy, Donot, and Hangover through final payloads like CrimsonRAT and ObliqueRAT. The findings emphasize shared VBA patterns, cros…

Read More
Threat Research

CoinStomp Malware Family Targets Asian Cloud Service Providers

January 31, 2022October 14, 2025 Securonix

Researchers from Cado Security uncovered CoinStomp, a Linux-based malware family targeting Asian Cloud Service Providers to mine cryptocurrency using a shell-script campaign. It employs timestomping, removal of cryptographic policies, and a /dev/tcp reverse sh…

Read More
Threat Research

SolarMarker campaign used novel registry changes to establish persistence

January 31, 2022October 18, 2025 Securonix

SolarMarker is a .NET information stealer and backdoor distributed via novel MSI installers and PowerShell-based deployment. SophosLabs describes how the campaign used SEO poisoning, deceptive web pages, and a multi-stage redirect and persistence technique to …

Read More
Threat Research

Ugg Boots 4 Sale: A Tale of Palestinian-Aligned Espionage | Proofpoint US

January 31, 2022October 13, 2025 Securonix

TA402, a Palestinian-aligned APT, has deployed NimbleMamba, a new implant intended to replace LastConn, in targeted Middle East campaigns. The operation blends geofenced links, actor-controlled domains, and Dropbox-based C2/exfiltration with redirects to legit…

Read More
Threat Research

Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

January 28, 2022October 16, 2025 Securonix

Antlion, a Chinese APT, deployed a custom .NET loader called xPack to compromise Taiwanese targets, focusing on financial and manufacturing organizations and conducting extended credential dumping and data staging. The operation used a mix of custom loaders an…

Read More

Posts pagination

Previous 1 … 484 485 486 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.