Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: IOS

Threat Research

“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed

October 17, 2022October 17, 2025 Securonix

Dormant Colors describes a widespread campaign of malicious browser extensions that infect millions of users via malvertising, then covertly load and update weaponized code to harvest data and enable targeted fraud. The investigation exposes a robust, globally…

Read More
Threat Research

Water Labbu Abuses Malicious DApps to Steal Cryptocurrency

September 26, 2022October 16, 2025 Securonix

Water Labbu is a threat actor that parasitically hijacks scam DApp websites by injecting malicious JavaScript to steal cryptocurrency. The campaign uses injected payloads and delivery servers to obtain wallet permissions and drain USDT balances, disguising act…

Read More
Threat Research

Cyble – Fake Telegram Site Delivering RAT Aimed At Chinese Users

September 13, 2022October 16, 2025 Securonix

CRIL researchers uncovered a fake Telegram download site that leads Windows users to a malicious MSI installer, which abuses Windows Defender components to operate a remote-access Trojan. The malware uses DLL side-loading, memory injection, and a C2 channel to…

Read More
Threat Research

Attackers Continue to Abuse Google Sites and Microsoft Azure to Host Cryptocurrency Phishing

September 8, 2022October 15, 2025 Securonix

Attackers continue to abuse Google Sites and Microsoft Azure Web Apps to host cryptocurrency phishing campaigns targeting major wallets and exchanges, with new pages and targets emerging over time. The operation relies on two stages—SEO-driven first pages and …

Read More
Threat Research

Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations | CISA

September 8, 2022October 15, 2025 Securonix

IRGC-affiliated cyber actors exploited known Fortinet FortiOS and Microsoft Exchange vulnerabilities, plus VMware Horizon Log4j flaws, to gain initial access and conduct ransomware-like operations involving data encryption and data extortion. The advisory outl…

Read More
Threat Research

Cyble – Phishing Campaign Targets Japanese Tax Payers

September 7, 2022October 23, 2025 Securonix

Cyble researchers uncovered a phishing campaign impersonating Japan’s National Tax Agency to steal V-Preca card details from Japanese taxpayers, combining fake NTA sites, smishing, and Android malware (FakeCop) with extensive C2 infrastructure. The operation e…

Read More
Threat Research

Opsec Mistakes Reveal COBALT MIRAGE Threat Actors

September 6, 2022October 17, 2025 Securonix

Secureworks CTU analyzed a June 2022 ransomware incident involving the Iranian COBALT MIRAGE group, highlighting continued use of known TTPs. The operation deployed ProxyShell exploits, web shells, and TunnelFish, encrypted servers with BitLocker, and left tra…

Read More
Threat Research

Cyble – Adversaries Actively Utilizing PowerShell Empire

August 29, 2022October 18, 2025 Securonix

Cyble Research and Intelligence Labs (CRIL) detected active PowerShell Empire infrastructure being used in the wild, including multiple infections and post-exploitation activities leveraging the Empire framework. The article details Empire’s listener/stager/ag…

Read More
Threat Research

Play Ransomware Attack Playbook Similar to that of Hive, Nokoyawa

August 29, 2022October 14, 2025 Securonix

Play is a new ransomware family that mirrors Hive and Nokoyawa, suggesting shared operators and attack infrastructure. It differentiates itself with AdFind-based Active Directory discovery and a blend of LOLBins, GPO-based deployment, and double-extortion tech…

Read More
Threat Research

Chromeloader browser hijacker

August 24, 2022October 15, 2025 Securonix

ChromeLoader, also known as Choziosi Loader, has evolved through multiple versions since late 2021, complicating atomic indicator-based detections. The analysis tracks its execution chain from obfuscated PowerShell to a Chrome/Edge/Firefox extension, detailing…

Read More
Threat Research

XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python

August 15, 2022October 16, 2025 Securonix

XCSSET, a macOS malware family, updated in 2022 to adapt to macOS Monterey and to prepare for a future without Python by removing Python-based components and shifting toward SHC-compiled droppers and run-only AppleScripts. The analysis outlines infection refin…

Read More
Threat Research

Cyble – EvilCoder Project Selling Multiple Dangerous Tools Online

August 11, 2022October 13, 2025 Securonix

Cyble researchers exposed a dark web post by a malware developer selling a powerful Windows RAT suite, including XWorm with ransomware and HVNC capabilities. The article details the toolset, persistence and anti-analysis techniques, data exfiltration, and the …

Read More
Threat Research

Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users

August 4, 2022October 14, 2025 Securonix

Iron Tiger’s operation against Mimi chat installers shows a supply chain compromise delivering HyperBro on Windows and rshell on macOS/Linux across multiple targets. The campaign spans three major platforms, uses code obfuscation, and establishes C2 communicat…

Read More
Threat Research

So RapperBot, What Ya Bruting For? | FortiGuard Labs

July 27, 2022October 15, 2025 Securonix

FortiGuard Labs tracks RapperBot, a rapidly evolving IoT malware family that borrows heavily from Mirai but switches from Telnet to SSH brute forcing for initial access on Linux devices. The campaign shows notable persistence and credential-access capabilities…

Read More
Threat Research

Deception at a scale

July 26, 2022October 17, 2025 Securonix

VirusTotal’s Deception at scale report analyzes how malware abuses trust by hiding in legitimate installers, signing certificates, and masquerading as popular applications to deliver malicious payloads. It highlights social engineering trends and practical tec…

Read More

Posts pagination

Previous 1 … 155 156 157 158 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.