Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: THREAT INTELLIGENCE

Threat Research

A stealthy threat uncovered: TeaBot on Google Play Store | Cleafy Labs

February 21, 2024October 19, 2025 admin

Cleafy Labs identified a TeaBot campaign that used a malicious dropper app on the Google Play Store to dynamically download a dex file and a secondary APK, performing multiple checks and evasion steps before installing the banking trojan. The final TeaBot payl…

Read More
Threat Research

Ivanti Connect Secure VPN Exploitation – Correctly Interpreting DNS IoCs

February 20, 2024October 16, 2025 Infoblox

On January 10, 2024, Ivanti disclosed that their Connect Secure VPN devices were breached through two zero-day vulnerabilities. Organizations using these devices are rapidly working to patch and safeguard their networks from potential compromise. The situation…

Read More
Threat Research

Dark Web Profile: Hunters International – SOCRadar® Cyber Intelligence Inc.

February 20, 2024October 16, 2025 SocRadar

Hunters International emerged in late 2023 as a RaaS operation with technical lineage and tactics resembling Hive, continuing cyber extortion trends despite Hive’s takedown. The group claims independence, focuses on data theft over encryption, and shows ties t…

Read More
Interesting Stuff

Cybersecurity Glossary

February 17, 2024October 1, 2025 iStuff

Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest cybersecurity attack vectors and threats is an essential part of securing the enterprise against breaches and compromised data. https://www.proofpoint.com/us/thre…

Read More
Threat Research

Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign

February 16, 2024October 16, 2025 RecordedFuture

Insikt Group has observed TAG-70 leveraging cross-site scripting (XSS) vulnerabilities against Roundcube webmail servers in Europe, targeting government, military, and national infrastructure.

Read More
Threat Research

Dark Web Profile: Sandman APT – SOCRadar® Cyber Intelligence Inc.

February 12, 2024October 20, 2025 Securonix

The Sandman APT group has drawn major attention for targeting telecommunications providers in Europe, the Middle East, and South Asia, employing LuaDream, a LuaJIT-based modular backdoor, to achieve stealthy espionage with minimal footprints. Research ties San…

Read More
Threat Research

Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023

February 10, 2024October 21, 2025 RecordedFuture

Discover key insights from Insikt Group’s analysis on ransomware exploitation patterns and targets from 2017–2023.

Read More
Interesting Stuff

Cyber Security Glossary: The Ultimate List & Quiz

February 6, 2024September 28, 2025 Morphisec

If you have anything to do with cyber security, you know it employs its own unique and ever-evolving language. Jargon and acronyms are the enemies of clear writing—and are beloved by cyber security experts. So Morphisec has created a comprehensive cyber security glossary that explains commonly…

Read More
Threat Research

ScarCruft | Attackers Gather Strategic Intelligence and Target Cybersecurity Professionals

January 23, 2024October 16, 2025 Securonix

SentinelLabs observed ScarCruft targeting North Korea-focused media and experts, with malware found in planning and testing phases for future campaigns. The group is experimenting with new infection chains that use decoy threat reports to attract threat-intell…

Read More
Cyber Security News

Medusa Ransomware Turning Your Files into Stone

January 12, 2024September 28, 2025 admin

Executive Summary Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. Medusa threat actors use this site to disclo…

Read More
Threat Research

From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence

December 28, 2023October 18, 2025 Securonix

Unit 42’s timely threat intelligence roundup for Oct–Dec 2023 surveys malware campaigns, infection chains, and IoCs shared via social channels. It highlights recurring families—DarkGate, Pikabot, IcedID, AsyncRAT, and JinxLoader—and TA577 activity, with practi…

Read More
Threat Research

Financially motivated threat actors misusing App Installer | Microsoft Security Blog

December 27, 2023October 15, 2025 Securonix

Microsoft Threat Intelligence warns that financially motivated actors are abusing the ms-appinstaller protocol to distribute malware via signed MSIX packages and malicious landing pages, tying multiple groups like Storm-0569, Storm-1113, Sangria Tempest, and S…

Read More
Threat Research

Annual Payment Fraud Intelligence Report: 2023

December 22, 2023October 15, 2025 RecordedFuture

2023’s payment fraud trends predict a persistent underground market and evolving sophisticated cyber-fraud threats in 2024.

Read More
Threat Research

DNS for Early Detection – LAZARUS KANDYKORN

December 15, 2023October 13, 2025 Infoblox

Infoblox’s DNS Early Detection Program swiftly identifies potentially harmful domains, notably recognizing the KandyKorn malware campaign from the Lazarus Group. The program highlights the critical need for rapid response against such threats, providing timely…

Read More
Threat Research

ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware

December 9, 2023October 15, 2025 Securonix

Threat intelligence from X-Force details ITG05’s use of the Israel-Hamas conflict as lure material to deliver the Headlace backdoor across at least 13 countries, leveraging official documents and decoys. The malware chain comprises a dropper, a VBScript launch…

Read More

Posts pagination

Previous 1 … 181 182 183 … 185 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.