Search Post related with “Threat Research”
*Total Collection : 5285 Threat Research (auto update every day)
Last 100 Threat Research
- Revolutionizing XDR with Gen AI: Next-Level Security Analysis for Advanced Threat Protection
- Backdoor implant discovered on PyPI posing as debugging utility
- Scams and Malicious Domains Emerging from Breaking News
- Emulating the Terrorizing VanHelsing Ransomware
- APT PROFILE : Transparent Tribe aka APT36
- Technical Analysis of TransferLoader
- CVE-2025-32756 Exploited in the Wild, Affecting Multiple Fortinet Products
- The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
- Introducing WizOS: Securing Wiz from the ground up with hardened, near-zero-CVE container base images.
- Excel(ent) Obfuscation: Regex Gone Rogue
- DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt
- APT GROUP123
- April 2025 Threat Trend Report on Ransomware
- Post-Exploitation Activities Observed from the Samsung MagicINFO 9 Server Flaw
- Tales from the cloud trenches: The Attacker doth persist too much, methinks
- Evolution of Tycoon 2FA Defense Evasion Mechanisms: Analysis and Timeline
- Misbehaving Modalities: Detecting Tools, Not Techniques
- TA406 Pivots to the Front
- Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
- Same name, different hack: PyPI package targets Solana developers
- ChineseGroupExploitingSAPVulnerability
- Finding Malware: Unveiling LUMMAC.V2 with Google S… – Google Cloud Community
- HuntingMaliciousDesktop_Files
- Marbled Dust Leverages Zero-Day in Output Messenger for Regional Espionage
- Rounding Up the DNS Traces of RA World Ransomware
- Analysis of the APT37 Attack Case Under the Guise of a South Korean National Security Strategy Think Tank (Operation Name: Toybox Story)
- Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants
- April 2025 Trends Report on Phishing Emails
- Brief Disruptions, Bold Claims: The Tactical Reality Behind the India-Pakistan Hacktivist Surge
- North Korea Hacking Group Kimsuky Disguised NDA Document Malware Distribution – NDA.pdf.msc File Warning (2025.5.4)
- COLDRIVER_Using_LOSTKEYS_Malware
- Threat Brief: CVE-2025-31324
- TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
- Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources
- Lumma Stealer, coming and going
- Lumma Infostealer Continues Its GitHub Social Engineering Campaign
- PupkinStealer : A .NET-Based Info-Stealer
- Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware
- Emulating the Infestive Termite Ransomware
- The Future Has Arrived: Defining Preemptive Data Security
- AhnLab Detection Information on BPFDoor Exploited in Recent Hacking Attacks and KISA Hash Notice
- Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
- Pure Crypter Malware Analysis: 99 Problems but Detection Ain’t One
- Tricked by trust: How OAuth and device code flows get abused
- Cyber criminals impersonate payroll, HR and benefits platforms to steal information and funds
- Finding Minhook in a sideloading attack – and Sweden too
- Unmasking the FreeDrain Network
- Weaponizing Facebook Ads: Inside the Multi-Stage Malware Campaign Exploiting Cryptocurrency Brands
- FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
- Measuring the US-China AI Gap
- New Finance Scam Discovered Abusing Niche X/Twitter Advertising Loophole
- Backdooring the IDE: Malicious npm Packages Hijack Cursor Editor on macOS
- RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale
- New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms
- Industry InsightsAnomaly-based threat hunting: Darktrace’s approach in actionbyNathaniel Jones
- Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)
- Inferno Drainer Reloaded: Deep Dive into the Return of the Most Sophisticated Crypto Drainer
- Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation
- New MintsLoader Campaign Spreads Stealc Malware Through Compromised PEC Mailboxes
- Ransomware Attackers Leveraged Privilege Escalation Zero-day
- Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance
- Distribution of IIS Malware Targeting Web Servers (Larva-25003)
- Malicious PyPI Package Targets Discord Developers with Remote Access Trojan
- Agenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their Arsenal
- Telegram Tango: Dancing with a Scammer
- SKT Telecommunications Hacking File Analysis of Smartadm Key Points
- Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
- Mamona: Technical Analysis of a New Ransomware Strain
- Atomic Stealer Malware Disguised as Crack Program (macOS)
- Do Tigers Really Change Their Stripes?
- Uroboros Revisited: Tracing PatchGuard-Evasive Techniques Beyond SSDT Hooking
- Tempering Tax Season Troubles with DNS Intel
- Bit ByBit – emulation of the DPRK’s largest cryptocurrency heist
- Phishing Campaign Targeting SPID via Fake AgID Domain
- Exposed APIs, Leaked Tokens: How a Semiconductor Giant Almost Got Breached
- CoGUI Phish Kit Targets Japan with Millions of Messages
- Lampion Is Back With ClickFix Lures
- APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux
- Kimsuky Malware Alert! USSC Research Center Impersonation Malware Discovered – Deceptive Attack Posing as Korea-Australia-Japan Cooperation Dialogue (2025.4.16)
- Before the Packages Arrive: How SVigil Protected 375K+ Shoppers From a Data Leak Disaster
- North Korea Hacking Organization Konni Malicious Code Distribution Exploiting Fake Document for VAT Payment (National Tax Collection Act Enforcement Rules) (2025.4.28)
- Likely Chinese Threat Actor Uses Low Detection Linux Backdoor and NHAS Reverse SSH
- Gunra Ransomware – A Brief Analysis
- macOS Vulnerabilities: A Year of Security Research at Kandji
- NPM targeted by malware campaign mimicking familiar library names
- Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims – Arctic Wolf
- Decrypting the Inner DNS Workings of EncryptHub
- How a Leading Fintech Firm Was Exposed by Simple Security Oversights
- Retail Under Fire: Inside the DragonForce Ransomware Attacks on Industry Giants
- I StealC You: Tracking the Rapid Changes To StealC
- wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
- Campaign TrailSocGholish: From loader and C2 activity to RansomHub deploymentbyChristina Kreza
- Inside the Security Gaps of a Digital Lending Firm—And What You Can Learn
- What’s New In The Cado Platform Q4 24/25
- TerraStealerV2 and TerraLogger: Golden Chickens’ New Malware Families Discovered
- Level-up Splunk with Silent Push IOFA™ data
- Using Trusted Protocols Against You: Gmail as a C2 Mechanism
- Top 10 Malware Q1 2025
- Exploring the State of AI in Cyber Security: Past, Present, and Future
- Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government
>> Access All Threat Research
Reference for Threat Research
This Threat Research category section will FILTER and FETCH the POST (related with Analysis Report only) from the following sites:
- asec.ahnlab.com
- any.run/cybersecurity-blog/
- attackiq.com
- bitdefender.com/blog/labs/
- cadosecurity.com/blog/
- cisa.gov/news-events/cybersecurity-advisories/
- crowdstrike.com/blog/
- cybereason.com/blog/category/research/
- darktrace.com/blog/
- fortinet.com/blog/threat-research/
- harfanglab.io/en/insidethelab/
- malwarebytes.com/blog/threat-intelligence/
- mandiant.com/resources/blog/
- mcafee.com/blogs/other-blogs/mcafee-labs/
- proofpoint.com/us/blog
- securelist.com/tag/malware-descriptions/
- securityintelligence.com/category/x-force/threat-intelligence/
- blog.talosintelligence.com
- trendmicro.com/en_us/research/
- unit42.paloaltonetworks.com
- nextron-systems.com/blog/
- team-cymru.com/blog/categories/threat-research/
- zscaler.com/blogs/
- blog.sonicwall.com
- labs.k7computing.com/
- recordedfuture.com/blog
- blog.sekoia.io/category/research-threat-intelligence/
- embee-research.ghost.io
- netspi.com/blog/technical/
- huntress.com/blog
- other 100++ sources
For the sites below, automatic FETCH cannot be performed
(i need to monitor it manual, will be delay 3-7 days)
Bellow are other reference, but for some reason i’m not fetching it automatically
(i need to review the article manually, will be delay 3-5 days)
- cleafy.com/labs (update 1-2 months)
- guidepointsecurity.com/blog/ > category: threat advisory
- research.openanalysis.net
- blog.phylum.io/tag/research/
- shadowstackre.com/analysis/
- mssplab.github.io
- farghlymal.github.io
- asec.ahnlab.com/ko/
- blog.bushidotoken.net
- kroll.com/en/insights/publications/cyber
- Sentinelone.com
- blog.lumen.com
Update
- December, 2024: securonixblog – Fixed (xpath error)
- December, 2024: huntress – Fixed (xpath error)
- December, 2024: nccgroup – Failed (Incapsula)
- December, 2024: Mandiant – Removed (now part of Google Cloud)
- December, 2024: antiy.cn – Failed (curl or xpath error)
- December, 2024: sonicwall.com – Failed (curl error)
- January, 2025: team-cymru.com (RSS Feed Removed)
Update January, 2025
“Due to copyright reasons, starting January 2025, this site will no longer display the full content of sourced articles. Only Summaries, Key Points, MITRE Tactics for Threat Research, and selected IoCs will be provided. To read the full article, please click on the ‘source’ link to view it on the original website.”
Views: 2593