Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: IOS

Threat Research

Cyble – Fake Atomic Wallet Website Distributing Mars Stealer

July 25, 2022October 14, 2025 Securonix

Threat actors impersonate Atomic Wallet with a phishing site to deliver Mars Stealer, a credential-theft malware. The campaign uses a staged download chain, PowerShell, AES decryption, and a Discord-hosted payload that exfiltrates data to a C2 server. #MarsSte…

Read More
Threat Research

Cyble – Targeted Attacks Being Carried Out Via DLL SideLoading

July 21, 2022October 15, 2025 Securonix

Threat actors are leveraging DLL sideloading in legitimate Microsoft applications to deliver a Cobalt-Strike beacon. The dropped DLL is loaded from application folders and communicates with a C2 URL hosted on CloudFront to enable beacon operations. #QakBot #Co…

Read More
Threat Research

Threat Actors Leveraging Microsoft Applications via DLL SideLoading – Detection & Response – Security Investigation

July 20, 2022October 16, 2025 Securonix

Threat actors abuse DLL sideloading to run malicious code through legitimate Microsoft applications (Teams and OneDrive), dropping and loading a malicious DLL that communicates with a remote C2 and leverages Cobalt Strike Beacon for post‑exploitation. The camp…

Read More
Threat Research

CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit

July 18, 2022October 13, 2025 Securonix

CosmicStrand is a sophisticated UEFI firmware rootkit attributed to a Chinese-speaking threat actor, designed to persist from the earliest boot stages and deploy kernel- and user-mode payloads. It achieves durable persistence by implanting in firmware (CSMCORE…

Read More
Threat Research

Lightning Framework: New “Swiss Army Knife” Linux Malware

July 6, 2022October 14, 2025 Securonix

Lightning Framework is a modular, undetected Linux malware framework with a downloader, core, and multiple plugins, including rootkit-capable components, that can communicate with a threat actor via a malleable C2 configuration. It leverages typosquatting, per…

Read More
Threat Research

I see what you did there: A look at the CloudMensis macOS spyware

July 6, 2022October 15, 2025 Securonix

CloudMensis is a macOS backdoor that spies on victims by exfiltrating documents, keystrokes, and screen captures, and communicates with its operators exclusively via public cloud storage services. It uses a two-stage architecture where the first stage download…

Read More
Threat Research

GeckoSpy: Pegasus Spyware Used against Thailand’s Pro-Democracy Movement – The Citizen Lab

June 29, 2022October 16, 2025 Securonix

Pegasus spyware was used against Thailand’s pro-democracy movement, with at least 30 civil society victims infected between October 2020 and November 2021, triggering Apple security notifications in November 2021 and a collaborative forensic investigation. The…

Read More
Threat Research

Update: IconBurst npm software supply chain attack grabs data from apps and websites

June 21, 2022October 14, 2025 Securonix

Two sentences summarizing the content: ReversingLabs uncovered a widespread npm software supply chain attack where malicious JavaScript packages were published to steal form data from apps and websites. The campaign used typosquatting to impersonate legitimate…

Read More
Threat Research

Cybercriminals Use Azure Front Door in Phishing Attacks

June 9, 2022October 16, 2025 Securonix

Phishing content is increasingly delivered via Azure Front Door, with attackers using lookalike domains to harvest credentials from multiple major services. They rely on compromised email accounts to spread targeted phishing, impersonating brands like SendGrid…

Read More
Threat Research

New IceXLoader 3.0 – Developers Warm Up to Nim | FortiGuard Labs

June 8, 2022October 16, 2025 Securonix

IceXLoader is a Nim-based commercial loader promoted in malware forums to download and deploy additional payloads on Windows machines, with ties to NimzaLoader used by the TrickBot group. The article outlines IceXLoader v3.0’s technical behavior, potential del…

Read More
Threat Research

Cyble – Hydra Android Malware Distributed Via Play Store

June 6, 2022October 13, 2025 Securonix

Cyble Research Labs identified an Android malware variant distributed via the Play Store that acts as a Hostile Downloader to fetch the Hydra Banking Trojan. The app masquerades as Document Manager, uses fake update prompts, and communicates with a TOR-enabled…

Read More
Threat Research

How SeaFlower 藏海花 installs backdoors in iOS/Android web3 wallets to steal your seed phrase

June 2, 2022October 17, 2025 Securonix

SeaFlower is a highly sophisticated intrusion set that targets web3 wallets by delivering backdoored iOS/Android apps, injecting covert code to exfiltrate seed phrases and balances. It uses provisioning-based sideloading, dylib injections, React Native bundle …

Read More
Threat Research

Technical Analysis of PureCrypter: A Fully-Functional Loader Distributing Remote Access Trojans and Information Stealers

June 2, 2022October 15, 2025 Securonix

PureCrypter is a fully featured loader sold since 2021 that distributes a range of remote access trojans and information stealers. It uses a .NET-based, obfuscated, and encrypted delivery chain with protobuf-configured options for persistence, injection, and d…

Read More
Threat Research

Lazarus Group Exploiting Log4Shell Vulnerability (NukeSped) – ASEC BLOG

April 18, 2022October 15, 2025 Securonix

Lazarus Group targeted Korea by exploiting the Log4j CVE-2021-44228 vulnerability on unpatched VMware Horizon to install NukeSped and related components. The operation includes NukeSped backdoors, INFOSTEALER, and Jin Miner modules, with data exfiltration and …

Read More
Threat Research

COBALT MIRAGE conducts ransomware operations in U.S.

April 11, 2022October 15, 2025 Securonix

Secureworks CTU researchers analyzed COBALT MIRAGE’s ransomware operations in the United States, spotting two intrusion clusters: Cluster A uses BitLocker/DiskCryptor for opportunistic ransomware, while Cluster B pursues targeted intrusions with some ransomwar…

Read More

Posts pagination

Previous 1 … 156 157 158 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.