Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Log4U, Shell4Me

January 20, 2022October 13, 2025 Securonix

BlackBerry researchers link the Prophet Spider Initial Access Broker (IAB) group to exploiting the Log4j (Log4Shell) vulnerabilities in VMware Horizon to break into organizations. The article outlines IoCs, observed post-exploitation payloads (cryptomining, Co…

Read More
Threat Research

KONNI evolves into stealthier RAT

January 20, 2022October 21, 2025 Securonix

KONNI RAT has evolved into a stealthier Remote Administration Tool under the Kimsuky umbrella, with ongoing development and updates to evade detection. The post highlights major changes (AES-protected strings and files, a move away from rundll, and enhanced ob…

Read More
Threat Research

Chasing Chaes Kill Chain – Avast Threat Labs

January 20, 2022October 16, 2025 Securonix

Chaes is a Brazil-only banking trojan that uses a multi-stage delivery chain to steal Chrome credentials and intercept logins to Brazilian banking sites. Avast found Chaes artifacts on over 800 compromised WordPress sites in Brazil (700+ with Brazilian TLDs), …

Read More
Threat Research

New Threat Campaign: AsyncRAT Introduces a New Delivery Technique

January 20, 2022October 14, 2025 Securonix

Morphisec identifies a new AsyncRAT delivery campaign that uses an HTML attachment to deliver a base64-encoded ISO file, constructed in-browser and mounted to execute staged loaders. The multi-stage chain includes HTML/JavaScript decoding, reflective .NET inje…

Read More
Threat Research

Watering hole deploys new macOS malware, DazzleSpy, in Asia

January 19, 2022October 18, 2025 Securonix

ESET analyzes a watering-hole campaign that delivers a new macOS backdoor named DazzleSpy via a WebKit/Safari exploit chain. Targets were Hong Kong pro-democracy individuals, with infection hosted on amnestyhk.org and other compromised sites like fightforhk.co…

Read More
Threat Research

Infected PowerPoint Files Using Cloud Services to Deliver Multiple Malware

January 19, 2022October 14, 2025 Securonix

Threat actors deliver multiple malware via malicious PowerPoint Add-Ins and a multi-stage chain that uses cloud services to host payloads. The operation blends phishing, LoLBins, VBS, and PowerShell to drop AgentTesla and a cryptocurrency stealer, with stages …

Read More
Threat Research

How BRATA is monitoring your bank account | Cleafy Labs

January 19, 2022October 21, 2025 Securonix

BRATA continues to evolve with new targets and features, including factory reset, GPS tracking, multi-channel C2 (HTTP and WebSocket), and ongoing monitoring via VNC and keylogging to facilitate unauthorized wire transfers. The report details BRATA variants A,…

Read More
Threat Research

假旗 or 升级?疑似海莲花利用Glitch平台的攻击样本再现

January 19, 2022October 13, 2025 Securonix

A collaborative analysis by a Qianxin team examines a wave of mht/Web Archive-based attacks delivering malicious DLLs via Office macros on Glitch, noting overlaps with OceanLotus but also distinct traits. The operation uses VBA obfuscation, in-memory DLL loadi…

Read More
Threat Research

Investigating APT36 or Earth Karkaddans Attack Chain and Malware Arsenal

January 18, 2022October 15, 2025 Securonix

Earth Karkaddan (APT36) is analyzed through its use of CrimsonRAT on Windows and CapraRAT/ObliqueRAT on Android, detailing infection chains based on spear-phishing, USB worms, and malicious macros. The piece also covers C2 communications, persistence mechanism…

Read More
Threat Research

New STRRAT RAT Phishing Campaign | FortiGuard Labs

January 14, 2022October 14, 2025 Securonix

Fortinet FortiGuard Labs analyzes a phishing campaign that delivers a STRRAT variant as a direct attachment, bypassing the usual dropper stage. The campaign uses spoofed shipping-themed emails, obfuscated Java payloads, and a mix of C2 communications and crede…

Read More
Threat Research

Emotet Spam Abuses Unconventional IP Address Formats to Spread Malware

January 13, 2022October 15, 2025 Securonix

Emotet spam campaigns are abusing hexadecimal and octal IP address formats to evade pattern-matching detection, delivering malware via Excel 4.0 Macros and HTA code. The operation leads to second-stage payloads like TrickBot and Cobalt Strike beacons, with gui…

Read More
Threat Research

DTPacker – a .NET Packer with a Curious Password | Proofpoint US

January 13, 2022October 16, 2025 Securonix

Proofpoint details DTPacker, a two-stage .NET packer/downloader that uses Donald Trump-themed fixed keys to decrypt its second stage and deliver payloads such as Agent Tesla, Ave Maria, AsyncRAT, and FormBook. The campaigns blend varied encoding/obfuscation an…

Read More
Threat Research

FIN7 Uses Flash Drives to Spread Remote Access Trojan – Fraud Intelligence – Gemini Advisory

January 13, 2022October 16, 2025 Securonix

Gemini Advisory analyzes FIN7’s use of trojanized USB devices (BadUSB) to deliver the IceBot Remote Access Trojan, enabling unauthorized remote access to victims’ networks. The report details the Arduino-based sketch used to infect USB devices, a network of pa…

Read More
Threat Research

DDoS IRC Bot Malware (GoLang) Being Distributed via Webhards – ASEC BLOG

January 13, 2022October 13, 2025 Securonix

Korean security researchers found DDoS IRC Bot strains masquerading as adult games, distributed via webhards, using a GoLang-based downloader alongside UDP Rat and Simple-IRC-Botnet. The malware installs through a downloader, persists via a scheduled task, inj…

Read More
Threat Research

New espionage attack by Molerats APT targeting users in the Middle East

January 13, 2022October 16, 2025 Securonix

ThreatLabz details a new Molerats APT espionage campaign targeting Middle East actors, delivering a .NET backdoor via macro-enabled Office documents and leveraging Dropbox as the C2 and data-exfiltration channel. The operation shows ties to Spark backdoor acti…

Read More

Posts pagination

Previous 1 … 486 487 488 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.