Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: IOS

Threat Research

Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack

February 14, 2023October 14, 2025 Securonix

Trend Micro researchers attribute a new backdoor to the Earth Kitsune threat group, delivered via a watering hole operation and social engineering. The campaign blends patched installers, Chrome native messaging persistence, ECC-based cryptography for C2, and …

Read More
Threat Research

No Macro? No Worries. VSTO Being Weaponized by Threat Actors | Deep Instinct

February 1, 2023October 25, 2025 Securonix

VSTO Add-Ins can be weaponized to deliver and execute code via Office documents, offering persistence across Office sessions. The article details local and remote VSTO attack flows, including user prompts to enable Add-Ins, encoded PowerShell payloads, and a r…

Read More
Threat Research

ASEC Weekly Malware Statistics (January 16th, 2023 – January 22nd, 2023) – ASEC BLOG

January 26, 2023October 13, 2025 Securonix

Infostealer was the leading malware category in the Jan 16–22, 2023 period, accounting for 43.0% of samples, followed by downloader (30.06%) and backdoor (19.9%). The report highlights BeamWinHTTP, AgentTesla, Formbook, SmokeLoader, and Pony as top families, w…

Read More
Threat Research

Emotet Returns With New Methods of Evasion

January 19, 2023October 18, 2025 Securonix

Emotet has returned after a period of dormancy, expanding its toolkit with new evasion and propagation methods and heavily leveraging phishing campaigns to drop multiple payloads. It now features an SMB spreader for lateral movement, a Chrome data-stealer modu…

Read More
Threat Research

Traffic signals: The VASTFLUX Takedown

January 17, 2023October 15, 2025 Securonix

HUMAN’s Satori Threat Intelligence and Research Team dismantled a sophisticated malvertising operation named VASTFLUX that injected JavaScript into ad creatives to stack multiple video players behind a single banner and fraudulently register views. The operati…

Read More
Threat Research

Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475)

January 17, 2023October 16, 2025 Securonix

Mandiant tracks a suspected China-nexus operation that exploited Fortinet FortiOS SSL-VPN CVE-2022-42475 as a zero-day, deploying a backdoor named BOLDMOVE on Windows and Linux and targeting internet-facing devices. The campaign highlights how such devices ena…

Read More
Threat Research

Clearing the Air: Overblown Claims of Vulnerabilities, Exploits & Severity

January 17, 2023October 15, 2025 Securonix

Huntress shares their take on the ConnectWise Control vulnerability discussions, arguing there was no demonstrated exploit at the severity level claimed and advocating for responsible disclosure and collaboration. They emphasize social engineering and phishing…

Read More
Threat Research

Analysis of FG-IR-22-398 – FortiOS – heap-based buffer overflow in SSLVPNd | Fortinet Blog

January 10, 2023October 13, 2025 Securonix

Fortinet’s analysis details a targeted FortiOS SSL-VPN heap overflow (CVE-2022-42475) used to deploy a Linux implant masquerading as an IPS component. The write-up covers malware behavior, IoCs, C2 infrastructure, affected FortiGate models/versions, and recomm…

Read More
Threat Research

ASEC Weekly Phishing Email Threat Trends (December 25th, 2022 – December 31st, 2022) – ASEC BLOG

January 4, 2023October 13, 2025 Securonix

This weekly ASEC report analyzes phishing email threats from December 25–31, 2022, focusing on attachments used to deliver malware. It highlights Infostealer, FakePage, and Worm Malware as top attachment-based threats, detailing file extensions, distribution s…

Read More
Threat Research

BlueNoroff introduces new methods bypassing MoTW

December 22, 2022October 13, 2025 Securonix

BlueNoroff group expanded its malware delivery methods to bypass Mark-of-the-Web (MOTW) protections by using ISO and VHD disk image formats, and began experimenting with Visual Basic Script, Windows Batch scripts, and a Windows executable. They also operated a…

Read More
Threat Research

Cyble – Threat Actors Targeting Fans Amid FIFA World Cup Fever

December 2, 2022October 13, 2025 Securonix

Threat Actors are exploiting FIFA World Cup buzz to run a range of scams, including crypto phishing with fake NFT drops, fake FIFA-themed domains, WhatsApp-led scams, and broad malware campaigns. Cyble Research & Intelligence Labs (CRIL) documents multiple lur…

Read More
Threat Research

#StopRansomware: Hive Ransomware | CISA

November 15, 2022October 16, 2025 Securonix

Hive ransomware operates as a ransomware-as-a-service (RaaS) that has victimized thousands across sectors like Healthcare and Public Health, encrypting data and threatening leaks. The advisory inventories Hive’s TTPs, IOCs, and mitigations, including initial a…

Read More
Threat Research

Cyble – Phishing Campaign Targeting Indonesian BRI Bank Using SMS Stealer

November 4, 2022October 15, 2025 Securonix

Cyble researchers uncovered a phishing campaign targeting Bank Rakyat Indonesia (BRI) that escalates by distributing Android SMS stealers to harvest OTPs and bypass 2FA. The operation begins with credential- and OTP-phishing sites, then installs a custom SMS s…

Read More
Threat Research

Securonix Threat Labs Security Advisory: Apache Commons Text4Shell (CVE-2022-42889) Exploitation – Analysis and Detection

October 26, 2022October 14, 2025 Securonix

Text4Shell (CVE-2022-42889) is a critical remote code execution vulnerability in Apache Commons Text (versions 1.5–1.9) that can be triggered by crafted input strings to run code on vulnerable hosts. The advisory covers exploitation methods, potential post-exp…

Read More
Threat Research

Where is the Origin QAKBOT Uses Valid Code Signing

October 20, 2022October 13, 2025 Securonix

QAKBOT is observed using valid code signing certificates to sign malicious modules, enabling trusted-looking infections. The article reviews infection timelines, potential origins of abused certificates, and recommended countermeasures. #QAKBOT #Follina

Read More

Posts pagination

Previous 1 … 154 155 156 … 158 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.