Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: ZERO-DAY

Threat Research

Ukraine Targeted by Dark Crystal RAT (DCRat) | FortiGuard Labs

June 16, 2022October 14, 2025 Securonix

Two Ukrainian targets were hit by emails delivering malicious documents that leveraged a Follina-like vulnerability and malicious macros to drop a DCRat variant. FortiGuard Labs notes the campaign revolves around Dark Crystal RAT (DCRat) with multi-stage infec…

Read More
Threat Research

Cyble – Quantum Software:  LNK File-based Builders Growing In Popularity

June 10, 2022October 18, 2025 Securonix

Cyble Research Labs highlights a rise in using Windows .lnk shortcut files to deliver payloads via LOLBins like PowerShell and mshta, including a new “Quantum Builder” tool that can create .lnk, .hta, and .iso-based payloads. The report also notes potential La…

Read More
Threat Research

Cyble – Cerber2021 Ransomware Back In Action

June 7, 2022October 16, 2025 Securonix

Cerber2021 ransomware has resurfaced, delivered via exploitation of patched/unpatched vulnerabilities to target Confluence and Gitlab servers, then encrypts files on Windows and Linux with a Tor-based ransom site. The analysis details file encryption behavior,…

Read More
Threat Research

DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach

June 6, 2022October 16, 2025 Securonix

Volexity details a targeted Sophos Firewall breach that leveraged a zero-day remote code execution vulnerability (CVE-2022-1040) to install a webshell, establish persistence, and conduct MITM activity that extended to external systems such as CMS websites. Sop…

Read More
Threat Research

Crypto-Miners Leveraging Atlassian Zero-Day Vulnerability – Check Point Blog

May 31, 2022October 18, 2025 Securonix

Two security researchers describe how crypto-mining operations leveraged Atlassian Confluence zero-day CVE-2022-26134 to drop and execute mining payloads on Linux and Windows hosts, using a multi-stage chain from initial exploitation to persistence and lateral…

Read More
Threat Research

New Zero-day Exploit Spotted In The Wild – Cyble

May 18, 2022October 16, 2025 Securonix

Microsoft disclosed a new zero-day vulnerability in MSDT (CVE-2022-30190) that enables remote code execution. The exploit chain uses a malicious Word document to load a remote HTML file that runs PowerShell via the ms-msdt schema, with workarounds and indicato…

Read More
Threat Research

XLoader Botnet: Find Me If You Can – Check Point Research

May 17, 2022October 13, 2025 Securonix

Checkpoint researchers analyze the evolution of XLoader, focusing on how the botnet camouflages its real C2 servers among 64 decoy domains and how later versions smarterly rotate domains to evade analysis. The article details 2.5 and 2.6 updates that use proba…

Read More
Threat Research

Bitter APT adds Bangladesh to their targets

April 7, 2022October 16, 2025 Securonix

Cisco Talos detects an ongoing Bitter APT operation targeting Bangladesh since August 2021, featuring a new Trojan called ZxxZ with remote file execution capabilities. The campaign employs spear-phishing with Office exploits and a C2 infrastructure that uses A…

Read More
Threat Research

CaddyWiper Analysis: New Malware Attacking Ukraine

March 24, 2022October 13, 2025 Securonix

CaddyWiper is a Windows wiper that destroys data and wipes drives on Ukrainian infrastructure. It is delivered via Group Policy after compromising Active Directory, and follows WhisperGate, HermeticWiper, and IsaacWiper as the fourth observed in the same perio…

Read More
Threat Research

Remcos Trojan: Analyzing the Attack Chain

March 23, 2022October 14, 2025 Securonix

Morphisec Labs detects a new Remcos Trojan infection chain delivered through financial-themed phishing emails that lure users to open a malicious Excel file. The multi-stage attack uses VBScript and PowerShell to fetch further payloads from a C2, employs persi…

Read More
Threat Research

Mars Stealer: Exclusive New Threat Research

March 22, 2022October 13, 2025 Securonix

Mars Stealer is a modern infostealer derived from Oski, sold on underground forums with ongoing development and it targets browser credentials and cryptocurrency wallets. The Morphisec report details its delivery methods, compromised infrastructure, and expose…

Read More
Threat Research

Securonix Threat Labs Initial Coverage Advisory: Detection and Analysis of Spring4Shell RCE (CVE-2022-22965)

March 22, 2022October 14, 2025 Securonix

Securonix Threat Labs analyzes a currently unpatched zero-day in Spring Core (Spring4Shell) and its potential for remote code execution, outlining exploit mechanics, scope, and defense. The report covers how the vulnerability differs from Log4j, mitigation/det…

Read More
Threat Research

New JSSLoader Trojan Delivered Through XLL Files

March 16, 2022October 21, 2025 Securonix

Morphisec Labs reports a new JSSLoader variant delivered via unsigned XLL Excel add-ins, leveraging Excel’s add-in loading to fetch a payload. The campaign highlights evasion tactics (obfuscation and varying user-agents) and notes FIN7 as the historical threat…

Read More
Threat Research

Arid Gopher: Newest Micropsia Malware Variant | Deep Instinct

March 15, 2022October 16, 2025 Securonix

Deep Instinct’s Threat Research team uncovered a new Go-written Micropsia variant named Arid Gopher attributed to APT-C-23 (Arid Viper), with additional unseen second-stage payloads. The discovery highlights Go-based malware by Arid Viper and its evolving seco…

Read More
Threat Research

OverWatch Uncovers Ongoing NIGHT SPIDER Zloader Campaign

March 4, 2022October 18, 2025 Securonix

OverWatch tracked a widespread intrusion campaign that used bundled .msi installers masquerading as legitimate software to download and execute NIGHT SPIDER’s Zloader trojan (and in some cases, Cobalt Strike). The defenders focused on anomalous behavior, low-p…

Read More

Posts pagination

Previous 1 … 132 133 134 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.