Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

January 28, 2022October 16, 2025 Securonix

Antlion, a Chinese APT, deployed a custom .NET loader called xPack to compromise Taiwanese targets, focusing on financial and manufacturing organizations and conducting extended credential dumping and data staging. The operation used a mix of custom loaders an…

Read More
Threat Research

Qbot Likes to Move It, Move It

January 27, 2022October 14, 2025 Securonix

Qbot (QakBot) campaigns spread rapidly by delivering a malicious Excel macro that loads a QBot DLL, then injects into msra.exe to harvest browser data and Outlook emails. The operation escalates privileges, moves laterally across all workstations, and uses mul…

Read More
Threat Research

A detailed analysis of Lazarus APT malware disguised as Notepad++ Shell Extension

January 27, 2022October 16, 2025 Securonix

Lazarus targeted Boeing job-seekers using a lure document, Boeing BDS MSE.docx, to deliver a DLL that mimics legitimate Notepad++ functionality. The malware exfiltrates system and process information to four C2 servers after compression, XOR encryption, and Ba…

Read More
Threat Research

Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra

January 26, 2022October 16, 2025 Securonix

Volexity uncovered a zero-day cross-site scripting (XSS) vulnerability in Zimbra (CVE-2022-24682) that TEMP_Heretic targeted through spear-phishing campaigns to access and exfiltrate mail data. The attackers could load JavaScript in the victim’s Zimbra webmail…

Read More
Threat Research

Malicious CSV text files used to install BazarBackdoor malware

January 25, 2022October 18, 2025 Securonix

A phishing campaign uses specially crafted CSV text files to install the BazarLoader/BazarBackdoor malware by abusing Excel’s Dynamic Data Exchange (DDE) feature. The attack chain pivots through WMIC and PowerShell to download and execute a DLL, enabling remot…

Read More
Threat Research

Mars Stealer: Oski refactoring

January 25, 2022October 16, 2025 Securonix

Mars Stealer is an upgraded variant of Oski Stealer with added anti-analysis and credential theft capabilities, including browser and crypto wallet data harvesting, plus a modular downloader and self-removal mechanism. It uses encrypted strings, runtime API re…

Read More
Threat Research

Arid Viper APT targets Palestine with new wave of politically themed phishing attacks, malware

January 25, 2022October 14, 2025 Securonix

Cisco Talos identifies a new wave of the Delphi-based Micropsia implant operated by Arid Viper, targeting Palestinian entities and activists with politically themed decoys. The latest implants add multiple RAT and information-gathering capabilities, persistenc…

Read More
Threat Research

StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations

January 24, 2022October 16, 2025 Securonix

Cybereason Nocturnus tracks the Iranian APT Moses Staff, which has added a novel Remote Access Trojan named StrifeWater to its ransomware operations and uses it in the initial infection stage. StrifeWater provides capabilities like file listing, shell command …

Read More
Threat Research

Sugar Ransomware, a new RaaS

January 24, 2022October 14, 2025 Securonix

Sugar RaaS describes a new ransomware-as-a-service model focusing on individual machines and reusing components from other ransomware families. The article details the crypter, a Delphi-based ransomware sample, ransom notes, and IOCs including domains, an onio…

Read More
Threat Research

PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage

January 24, 2022October 15, 2025 Securonix

PowerCybereason Nocturnus researchers uncover a new PowerShell backdoor named PowerLess Backdoor used by Phosphorus (APT35) to espionage operations, featuring modular loaders and staged payloads including a keylogger and information stealer. The findings tie P…

Read More
Threat Research

Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables

January 24, 2022October 16, 2025 Securonix

Cisco Talos links a campaign targeting Turkish private organizations and government bodies to MuddyWater, an Iran-linked APT group, using malicious PDFs, Excel files and Windows executables to drop PowerShell-based downloaders and establish footholds. The oper…

Read More
Threat Research

Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

January 24, 2022October 19, 2025 Securonix

Shuckworm (Gamaredon) continues its Ukraine-focused cyber-espionage campaigns, using phishing and living-off-the-land techniques to deploy backdoors and remote-access tools. Symantec’s investigation documents a multi-stage July–August 2021 operation in Ukraine…

Read More
Threat Research

North Korea’s Lazarus APT leverages Windows Update client, GitHub in latest campaign

January 24, 2022October 15, 2025 Securonix

Lazarus Group’s latest campaign rounds up a spearphishing effort using Lockheed Martin-themed doc lures to drop a multi-stage payload. The operation hijacks execution via KernelCallbackTable, uses Windows Update Client for malicious runtime, and employs GitHub…

Read More
Threat Research

StellarParticle Campaign: Novel Tactics and Techniques | CrowdStrike

January 21, 2022October 16, 2025 Securonix

StellarParticle is CrowdStrike’s tracked campaign tied to COZY BEAR (APT29) and the SolarWinds incident, with activity continuing against multiple organizations. The operation employs novel techniques such as browser cookie theft and O365 service principal hij…

Read More
Threat Research

Hacktivist group shares details related to Belarusian Railways hack

January 21, 2022October 16, 2025 Securonix

The Belarusian Cyber Partisans disclosed documents related to a railway-targeting incident and discussed that Curated Intelligence member SttyK would study the methods used. The published material outlines an incident aimed at hindering operations and details …

Read More

Posts pagination

Previous 1 … 485 486 487 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.