Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: IOT

Threat Research

SpiderLabs Blog | Trustwave

July 12, 2023October 17, 2025 Securonix

Trustwave’s honeypot network across six countries reveals how Mirai, Mozi, and Kinsing botnets targeted enterprise applications to upload web shells and recruit devices into botnets for DDoS or cryptomining. The report details leveraging PoCs and CVEs (GoAnywh…

Read More
Threat Research

SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto

July 10, 2023October 13, 2025 Securonix

SCARLETEEL 2.0 expands into AWS Fargate and Kubernetes, refining its cloud-focused toolkit to steal credentials, escalate privileges, and mine cryptocurrency while evading newer security controls. Sysdig Threat Research Team documents a more resilient C2 archi…

Read More
Threat Research

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

July 7, 2023October 17, 2025 Securonix

Trend Micro analyzes Red Menshen’s BPFDoor variants that abuse Berkeley Packet Filter (BPF) in Linux and Solaris to bypass network protections. The analysis tracks the backdoor’s evolution from early 30-instruction filters to newer, more complex variants with …

Read More
Threat Research

IoT devices and Linux-based systems targeted by OpenSSH trojan campaign | Microsoft Security Blog

June 20, 2023October 16, 2025 Securonix

Microsoft researchers uncovered a campaign targeting internet-facing Linux-based systems and IoT devices that uses a patched OpenSSH to take control of devices and deploy cryptomining malware, backdoors, and rootkits. The operation leverages a hijacked OpenSSH…

Read More
Threat Research

Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives – Check Point Research

June 20, 2023October 21, 2025 Securonix

Check Point researchers traced Camaro Dragon, a Chinese-based espionage actor, deploying self-propagating USB malware (WispRider/HopperTick) that could spread globally from Southeast Asia, with DLL-side loading and antivirus evasion. The operation combines USB…

Read More
Threat Research

IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits

June 19, 2023October 20, 2025 Securonix

Unit 42 outlines a Mirai variant campaign targeting IoT devices since March 2023, exploiting a wide set of IoT vulnerabilities to recruit devices into a botnet used for DDoS and other attacks. The campaigns share infrastructure and malware characteristics, wit…

Read More
Threat Research

‘Sign in to continue’ and suffer : Attackers abusing legitimate services for credential theft – Check Point Blog

June 16, 2023October 15, 2025 Securonix

Check Point Research identified ongoing phishing campaigns that abuse legitimate form services to harvest credentials and exfiltrate data, helping attackers evade detection. The attackers rely on HTML attachments masquerading as login pages and employ services…

Read More
Threat Research

Behind the Scenes Unveiling the Hidden Workings of Earth Preta

June 15, 2023October 16, 2025 TrendMicro

Trend Micro analyzes Earth Preta (Mustang Panda) activity in 2023, detailing new arrival vectors (MIROGO, QMAGENT, TONEDROP) and a TONESHELL variant with a custom C&C protocol. The report also exposes the threat actor’s download infrastructure (fake Google Dri…

Read More
Threat Research

Tsunami DDoS Malware Distributed to Linux SSH Servers – ASEC BLOG

June 13, 2023October 15, 2025 Securonix

ASEC reports that Tsunami DDoS Bot, also known as Kaiten, was installed on poorly managed Linux SSH servers along with ShellBot, XMRig CoinMiner, and Log Cleaner. The campaign begins with dictionary or brute-force SSH access, followed by downloading and deploy…

Read More
Threat Research

Chinese Threat Actor Used Modified Cobalt Strike Variant to Attack Taiwanese Critical Infrastructure

May 28, 2023October 15, 2025 Securonix

A Chinese threat actor operated a modified Cobalt Strike variant, “Cobalt Strike Cat,” to attack Taiwanese government entities and critical infrastructure. The campaign covered recon, exploitation of remote code execution vulnerabilities, credential theft, and…

Read More
Threat Research

RapperBot DDoS Botnet Expands into Cryptojacking | FortiGuard Labs

May 5, 2023October 17, 2025 Securonix

FortiGuard Labs documents RapperBot expanding from a DDoS botnet into cryptojacking on Intel x64 machines by merging the bot with an XMRig miner. The campaign updates include a revamped C2 protocol, multi-layer encoding to evade detection, and SSH-key persiste…

Read More
Threat Research

Raspberry Robin: A global USB malware campaign providing access to ransomware operators

April 27, 2023October 18, 2025 Securonix

Raspberry Robin is a global USB-based malware campaign that acts as a loader, delivering ransomware operators and other loaders to target networks. It propagates via infected USB drives, uses legitimate Windows binaries to execute payloads, and relies on compr…

Read More
Threat Research

Zero Day Initiative — TP-Link WAN-side Vulnerability CVE-2023-1389 Added to the Mirai Botnet Arsenal

April 21, 2023October 16, 2025 Securonix

Zero Day Initiative flagged Mirai expanding its toolkit by incorporating CVE-2023-1389 to target TP-Link Archer AX21 routers, with evidence of active exploitation starting in April after TP-Link’s patch. The malware downloads and executes architecture-specific…

Read More
Threat Research

ShellBot Malware Being Distributed to Linux SSH Servers – ASEC BLOG

March 24, 2023October 15, 2025 Securonix

ShellBot is being distributed to poorly managed Linux SSH servers, leveraging SSH credential brute-forcing and IRC-based C2 channels to control infected hosts. The report details three ShellBot variants (LiGhT’s Modded perlbot v2, DDoS PBot v2.0, and PowerBots…

Read More
Threat Research

ChinaZ DDoS Bot Malware Distributed to Linux SSH Servers – ASEC BLOG

March 24, 2023October 15, 2025 Securonix

ChinaZ DDoSBot has been found installed on poorly managed Linux SSH servers, turning compromised hosts into bots capable of performing DDoS attacks. The article details Linux and Windows variants, their C2 communications, persistence mechanisms, and defender g…

Read More

Posts pagination

Previous 1 … 63 64 65 … 67 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.