Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: PRIVILEGE

Threat Research

Case of Attack Exploiting AnyDesk Remote Tool (Cobalt Strike and Meterpreter) – ASEC BLOG

June 22, 2022October 25, 2025 Securonix

MS-SQL servers are commonly targeted by attackers who gain control and install malware, including coin miners and ransomware. The article details a case where attackers deploy Cobalt Strike and Meterpreter on vulnerable MS-SQL servers to install AnyDesk for re…

Read More
Threat Research

Black Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit

June 16, 2022October 15, 2025 Securonix

Black Basta expanded its repertoire by employing QakBot as an entry point and using the PrintNightmare flaw to perform privileged file operations. It also leveraged the Coroxy backdoor and Netcat for lateral movement across networks. #BlackBasta #QakBot

Read More
Threat Research

Avos ransomware group expands with new attack arsenal

June 9, 2022October 15, 2025 Securonix

Talos observed a month-long AvosLocker campaign leveraging Sliver, Cobalt Strike, and network scanners to move laterally after exploiting Log4Shell on exposed VMware Horizon UAG appliances. The incident underscores the importance of properly configured securit…

Read More
Threat Research

QBot returns with new TTPS – Detection & Response – Security Investigation

June 7, 2022October 13, 2025 Securonix

QBot (QakBot) is a long-standing banking trojan that steals credentials and is spread via spam emails with macro-enabled Office documents. The article highlights two recent distribution methods (XLSB with hidden payload sheets and XLTM macro templates), detail…

Read More
Threat Research

DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach

June 6, 2022October 16, 2025 Securonix

Volexity details a targeted Sophos Firewall breach that leveraged a zero-day remote code execution vulnerability (CVE-2022-1040) to install a webshell, establish persistence, and conduct MITM activity that extended to external systems such as CMS websites. Sop…

Read More
Threat Research

Telerik UI exploitation leads to cryptominer, Cobalt Strike infections

June 5, 2022October 19, 2025 Securonix

An unknown threat actor exploits CVE-2019-18935 in Telerik UI for ASP.NET AJAX to seize control of Windows servers, drop a Cobalt Strike beacon, and stage further malware via PowerShell commands. Sophos MTR links these campaigns to earlier Blue Mockingbird act…

Read More
Threat Research

eSentire Threat Intelligence Malware Analysis: Purple Fox

June 2, 2022October 13, 2025 Securonix

Purple Fox malware evolved from an exploit kit used by RIG EK into an independent threat that deploys a multi-stage, stealthy infection chain featuring a rootkit, LOLBIN abuse, and privilege escalation via public CVEs. The analysis maps observed behaviors to M…

Read More
Threat Research

Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild – Avast Threat Labs

June 1, 2022October 13, 2025 Securonix

Avast researchers document Syslogk, a Linux kernel rootkit under development in the wild that leverages Adore-Ng foundations to hide itself and a Rekoobe backdoor embedded in a fake SMTP server. The malware can be revealed, loaded, and controlled via on-demand…

Read More
Threat Research

Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat

May 28, 2022October 16, 2025 Securonix

Symbiote is a highly evasive Linux threat that infects running processes by loading as a shared object via LD_PRELOAD to gain rootkit capabilities and remote access. Researchers describe its stealthy behavior—hiding itself and other malware, evading live foren…

Read More
Threat Research

Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years

May 26, 2022October 17, 2025 Securonix

Aoqin Dragon is a long-running Chinese-speaking APT tracked by SentinelLabs, active since 2013 and targeting government, education, and telecom organizations in Southeast Asia and Australia. The group uses document exploits, fake removable devices, DLL hijacki…

Read More
Threat Research

Will the Real Msiexec Please Stand Up? Exploit Leads to Data Exfiltration

May 24, 2022October 15, 2025 Securonix

Threat actors exploited CVE-2021-44077 to gain initial access to an internet-facing ManageEngine SupportCenter Plus instance, planted a web shell, and began days-long data exfiltration via web shell and RDP. The operation involved Plink-based SSH tunneling, LS…

Read More
Threat Research

Analyzing AsyncRAT distributed in Colombia by Blind Eagle | Welcome to Jstnk webpage

May 20, 2022October 15, 2025 Securonix

An in-depth look at AsyncRAT campaigns tied to APT-C-36 and related RATs, focusing on evolving TTPs and how the Colombian distribution behaves in practice. The analyzed sample (Stub.exe) reveals anti-analysis checks, persistence via scheduled tasks and Run key…

Read More
Threat Research

To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions

May 20, 2022October 18, 2025 Securonix

UNC2165 is analyzed as overlapping with Evil Corp activities and shifting toward ransomware deployments such as HADES and LOCKBIT, leveraging FAKEUPDATES, BEACON, and post-exploitation techniques to breach networks while evading sanctions. The report traces th…

Read More
Threat Research

Phishing Campaign Delivering Three Fileless Malware: AveMariaRAT / BitRAT / PandoraHVNC – Part II | FortiGuard Labs 

May 17, 2022October 14, 2025 Securonix

Fortinet’s FortiGuard Labs documented a phishing campaign that delivers three fileless malware to Windows hosts, enabling attacker control and data theft via a C2 channel. The payloads AveMariaRAT, PandorahVNC RAT, and BitRat steal credentials, capture screens…

Read More
Threat Research

New Nokoyawa Variant Catching Up to Peers with Blatant Code Reuse | FortiGuard Labs 

May 12, 2022October 18, 2025 Securonix

Nokoyawa is a Windows ransomware variant that traces its lineage to Karma/Nemty and increasingly reuses publicly available code to expand its capabilities. FortiGuard Labs reports new features such as Babuk-derived process and volume-enumeration code, a TOR-ba…

Read More

Posts pagination

Previous 1 … 302 303 304 … 306 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.