Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: INITIAL ACCESS

Threat Research

Ursnif Malware Banks on News Events for Phishing Attacks | Qualys Security Blog

April 7, 2022October 14, 2025 Securonix

Ursnif is a long-running banking trojan that steals credentials, downloads other malware, and acts as a keylogger. It is primarily delivered via spear-phishing emails that impersonate authorities and exploit current events, using macro-enabled attachments and …

Read More
Threat Research

Examining the Black Basta Ransomware’s Infection Routine

April 7, 2022October 15, 2025 Securonix

Black Basta’s infection routine is dissected, revealing how the ransomware relies on credential access, privilege escalation, and careful system manipulation to achieve encryption and extortion. The analysis also covers its methods for disabling recovery, alte…

Read More
Threat Research

Orion Threat Alert: Flight of the BumbleBee – Cynet

April 6, 2022October 15, 2025 Securonix

Orion Threat Research Team uncovered BumbleBee, a new loader used by Initial Access Brokers to deploy campaigns and inject Cobalt Strike into victims’ memory. The operation leverages spoofed identities and ISO-based delivery via TransferXL to lure users, with …

Read More
Threat Research

A Bad Luck BlackCat

April 5, 2022October 14, 2025 Securonix

BlackCat (ALPHV) is a Rust-based ransomware-as-a-service operation linked to BlackMatter and REvil lineage, notable for cross-platform samples and a sophisticated exfiltration workflow using Fendr/ExMatter. Telemetry suggests a close tie to past BlackMatter ac…

Read More
Threat Research

Enemybot: A Look into Keksec’s Latest DDoS Botnet | FortiGuard Labs

April 4, 2022October 14, 2025 Securonix

FortiGuard Labs observed a new DDoS botnet named Enemybot, attributed to Keksec, that borrows code from Gafgyt and Mirai while using obfuscation and a Tor-hidden C2 to complicate takedowns. It targets routers from Seowon Intech and D-Link and leverages a wide …

Read More
Threat Research

SystemBC Being Used by Various Attackers – ASEC BLOG

April 1, 2022October 13, 2025 Securonix

SystemBC is a proxy malware that has been used by various attackers for years, functioning as both a proxy bot and a downloader for additional payloads. It has recently been distributed through SmokeLoader and Emotet and has featured in ransomware campaigns, i…

Read More
Threat Research

CVE-2022-22965 Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware

March 30, 2022October 15, 2025 Securonix

Trend Micro Threat Research observed active exploitation of CVE-2022-22965 (Spring4Shell) enabling threat actors to weaponize and execute the Mirai botnet. The exploit chain drops Mirai in /tmp, changes permissions, and deploys a JSP web shell to execute comma…

Read More
Threat Research

Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials

March 28, 2022October 19, 2025 Securonix

Cybereason Nocturnus details a new espionage campaign by APT-C-23 targeting Israeli officials, featuring upgraded malware (Barb(ie) Downloader, BarbWire Backdoor, and VolatileVenom Android implant) and sophisticated social engineering to gain initial access. T…

Read More
Threat Research

FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7

March 24, 2022October 16, 2025 Securonix

FIN7’s intrusion landscape evolves from LOADOUT and GRIFFON in 2020 to POWERPLANT as the main PowerShell-based backdoor in 2021, with BEACON acting as a secondary access path and extensive PowerShell tradecraft continuing to shape their operations. The report …

Read More
Threat Research

Cicada: Chinese APT Group Widens Targeting in Recent Espionage Activity

March 24, 2022October 15, 2025 Securonix

Symantec details Cicada (a China-linked APT) widening its espionage activity, targeting governments and NGOs across multiple regions with Exchange server exploits, custom loaders, and backdoors such as Sodamaster and Mimikatz loader, plus tools like VLC and Wi…

Read More
Threat Research

Windows MetaStealer Malware – SANS Internet Storm Center

March 24, 2022October 17, 2025 Securonix

The diary documents a MetaStealer infection chain delivered via malicious Excel attachments that drop and persist a Windows EXE and DLL after macro execution and a VBScript loader. It also notes the malware abusing legitimate services like GitHub and transfer.…

Read More
Threat Research

Stolen Images Campaign Ends in Conti Ransomware

March 23, 2022October 13, 2025 Securonix

The Stolen Images campaign used IcedID as the initial access vector to drop Cobalt Strike beacons, leading to Conti ransomware deployment across a domain. The operation blended off-the-shelf remote-access tools (Atera, Splashtop), multiple Cobalt Strike server…

Read More
Threat Research

Mars Stealer: Exclusive New Threat Research

March 22, 2022October 13, 2025 Securonix

Mars Stealer is a modern infostealer derived from Oski, sold on underground forums with ongoing development and it targets browser credentials and cryptocurrency wallets. The Morphisec report details its delivery methods, compromised infrastructure, and expose…

Read More
Threat Research

New Conversation Hijacking Campaign Delivering IcedID

March 18, 2022October 14, 2025 Securonix

A new IcedID campaign uses conversation hijacking in phishing emails delivered from compromised Microsoft Exchange accounts to drop the IcedID loader. The operation shifts from office documents to ISO attachments, uses regsvr32 to proxy-run a DLL, and targets …

Read More
Threat Research

Chinese Threat Actor Scarab Targeting Ukraine

March 16, 2022October 16, 2025 Securonix

Ukraine CERT (CERT-UA) ties the Chinese threat actor Scarab to UAC-0026, marking one of the first publicly reported Ukraine-targeted operations by a non-Russian APT. The campaign centers on a HeaderTip backdoor delivered via macro-enabled lure documents and a …

Read More

Posts pagination

Previous 1 … 220 221 222 … 224 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.