Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: DEFENSE EVASION

Threat Research

Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years

May 26, 2022October 17, 2025 Securonix

Aoqin Dragon is a long-running Chinese-speaking APT tracked by SentinelLabs, active since 2013 and targeting government, education, and telecom organizations in Southeast Asia and Australia. The group uses document exploits, fake removable devices, DLL hijacki…

Read More
Threat Research

Shining the Light on Black Basta

May 25, 2022October 14, 2025 Securonix

Researchers document Black Basta’s observed TTPs during a recent incident response, detailing lateral movement, defense evasion, discovery, and encryption activities against Hyper-V environments and Veeam backups. The post also provides a technical breakdown o…

Read More
Threat Research

Will the Real Msiexec Please Stand Up? Exploit Leads to Data Exfiltration

May 24, 2022October 15, 2025 Securonix

Threat actors exploited CVE-2021-44077 to gain initial access to an internet-facing ManageEngine SupportCenter Plus instance, planted a web shell, and began days-long data exfiltration via web shell and RDP. The operation involved Plink-based SSH tunneling, LS…

Read More
Threat Research

From the Front Lines | Another Rebrand? Mindware and SFile Ransomware Technical Breakdown

May 24, 2022October 16, 2025 Securonix

Mindware is a ransomware operation active since March 2022, likely a rebrand of SFile, with attacks across healthcare and other sectors. It leverages Reflective DLL Injection, encrypts targeted files, and uses a public leaks site to pressure victims, including…

Read More
Threat Research

To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions

May 20, 2022October 18, 2025 Securonix

UNC2165 is analyzed as overlapping with Evil Corp activities and shifting toward ransomware deployments such as HADES and LOCKBIT, leveraging FAKEUPDATES, BEACON, and post-exploitation techniques to breach networks while evading sanctions. The report traces th…

Read More
Threat Research

Cyble – Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof Of Concept To Deliver Cobalt-Strike Beacon

May 12, 2022October 16, 2025 Securonix

Cyble researchers found a threat actor distributing fake PoCs for CVE-2022-26809 and CVE-2022-24500 on GitHub, targeting the Infosec community. The culprit malware is a .NET binary packed with ConfuserEX that displays fake exploit messages and then calls Power…

Read More
Threat Research

Space Pirates: исследуем инструменты и связи новой хакерской группировки

April 18, 2022October 16, 2025 Securonix

Space Pirates is an Asia-rooted advanced threat group whose activities span several backdoors and loaders, targeting government and aerospace/energy sectors in Russia, Georgia, and Mongolia. The report ties Space Pirates to multiple other APTs and tooling exch…

Read More
Threat Research

Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control | CISA

April 18, 2022October 17, 2025 Securonix

CISA warns that malicious actors linked to APT activity are exploiting CVE-2022-22954 and CVE-2022-22960 in VMware Workspace ONE Access and related products to achieve remote code execution and root-level access, chaining vulnerabilities for full system contro…

Read More
Threat Research

Chaos Ransomware Variant Sides with Russia | FortiGuard Labs 

April 14, 2022October 13, 2025 Securonix

FortiGuard Labs reports a Chaos ransomware variant that appears to side with Russia, delivering destructive payloads and offering no decryption option. The malware encrypts small files with AES-256 (RSA-wrapped keys) and fills larger files with random data, wh…

Read More
Threat Research

Onyx Ransomware Report – CYFIRMA

April 12, 2022October 16, 2025 Securonix

Onyx is a ransomware observed in April 2022 that encrypts files, appends the .ampkcz extension, and leaves a readme.txt ransom note. It uses several evasion, persistence, and exfiltration techniques, including process checks, startup-folder modifications, and …

Read More
Threat Research

Custom PowerShell RAT targets Germans seeking information about the Ukraine crisis

April 12, 2022October 13, 2025 Securonix

Threat actors lure Germans with updates about the Ukraine crisis via a decoy Baden-Württemberg site, delivering a PowerShell-based RAT that can steal data and execute commands. The operation uses AMSI bypass, creates a persistent scheduled task, and exfiltrate…

Read More
Threat Research

Bitter APT adds Bangladesh to their targets

April 7, 2022October 16, 2025 Securonix

Cisco Talos detects an ongoing Bitter APT operation targeting Bangladesh since August 2021, featuring a new Trojan called ZxxZ with remote file execution capabilities. The campaign employs spear-phishing with Office exploits and a C2 infrastructure that uses A…

Read More
Threat Research

Orion Threat Alert: Flight of the BumbleBee – Cynet

April 6, 2022October 15, 2025 Securonix

Orion Threat Research Team uncovered BumbleBee, a new loader used by Initial Access Brokers to deploy campaigns and inject Cobalt Strike into victims’ memory. The operation leverages spoofed identities and ISO-based delivery via TransferXL to lure users, with …

Read More
Threat Research

New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns

April 1, 2022October 15, 2025 Securonix

SolarMarker has evolved into a multi-stage threat delivering backdoors and infostealers, primarily via SEO-driven campaigns that lure users to download malicious documents. Itexfiltrates browser data, can transfer files, and executes commands from a C2, while …

Read More
Threat Research

Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload

March 23, 2022October 15, 2025 Securonix

Trend Micro’s Managed XDR team uncovered a campaign where SocGholish drops a BLISTER loader that in turn delivers the LockBit ransomware, highlighting layered evasion and loader-to-beacon chaining. The investigation details how these loaders operate together, …

Read More

Posts pagination

Previous 1 … 96 97 98 99 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.