Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

Tag: CLOUD

Threat Research

Cyble – Modified FiveM Spoofer Targeting Gamers   

October 4, 2022May 24, 2024 Securonix

Threat Actor Leveraging Discord Channel to Spread Malware Cyble Research and Intelligence Labs (CRIL) has continuously monitored phishing campaigns that distribute different malware families such

Read More
Threat Research

Malicious Tor Browser spreads through YouTube

September 30, 2022May 24, 2024 Securonix

While performing regular threat hunting activities, we identified multiple downloads of previously unclustered malicious Tor Browser installers. According to our telemetry, all the victims targeted

Read More
Threat Research

Analysis of LilithBot Malware and Eternity Threat Group

September 30, 2022May 24, 2024 Securonix

Introduction ThreatLabz recently discovered a sample of the multi-function malware LilithBot in our database. Further research revealed that this was associated with the Eternity group

Read More
Threat Research

CrowdStrike Falcon® Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer – crowdstrike.com

September 28, 2022May 24, 2024 Securonix

The CrowdStrike Falcon® platform, leveraging a combination of advanced machine learning and artificial intelligence, identified a new supply chain attack during the installation of a

Read More
Threat Research

Revealing Emperor Dragonfly: Night Sky and Cheerscrypt – A Single Ransomware Group – Sygnia

September 26, 2022May 24, 2024 Securonix

Key Takeaways Sygnia recently investigated a Cheerscrypt ransomware attack which utilized Night Sky ransomware TTPs. Further analysis       revealed that Cheerscrypt and Night Sky

Read More
Threat Research

The Anatomy of Wiper Malware, Part 3: Input/Output Controls | CrowdStrike

September 22, 2022May 24, 2024 Securonix

This is the third blog post in a four-part series. Read Part 1 | Part 2 | Part 4. In Part 1 of this four-part

Read More
Threat Research

Agent Tesla RAT Delivered by Quantum Builder With New TTPs

September 21, 2022May 24, 2024 Securonix

Zscaler ThreatLabz has observed a campaign that delivers Agent Tesla, a .NET based keylogger and remote access trojan (RAT) active since 2014, using a builder

Read More
Threat Research

More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID

September 21, 2022May 24, 2024 Securonix

This post is also available in: 日本語 (Japanese) Executive Summary Unit 42 recently observed a polyglot Microsoft Compiled HTML Help (CHM) file being employed in

Read More
Threat Research

Void Balaur | The Sprawling Infrastructure of a Careless Mercenary

September 21, 2022May 24, 2024 Securonix

Executive Summary The cyber mercenary group known as Void Balaur continues to expand their hack-for-hire campaigns into 2022 unphased by disruptions to their online advertising

Read More
Threat Research

NullMixer drops Redline Stealer, SmokeLoader and other malware

September 20, 2022May 24, 2024 Securonix

Executive Summary NullMixer is a dropper leading to an infection chain of a wide variety of malware families. NullMixer spreads via malicious websites that can

Read More
Threat Research

Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

September 19, 2022May 24, 2024 Securonix

Broadcom Software, tracks as Coreid (aka FIN7, Carbon Spider). Darkside was used in the Colonial Pipeline ransomware attack in May 2021. The extreme amount of

Read More
Threat Research

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

September 16, 2022May 24, 2024 Securonix

This post is also available in: 日本語 (Japanese) Executive Summary Cybercriminals compromise domain names to attack the owners or users of the domains directly, or

Read More
Threat Research

Technical Analysis of Crytox Ransomware

September 15, 2022May 24, 2024 Securonix

Key points Crytox is a ransomware family consisting of several stages of encrypted code that was first observed in 2020 The ransomware encrypts local disks

Read More
Threat Research

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

September 15, 2022May 24, 2024 Securonix

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining. We observed

Read More
Threat Research

DPRK Job Opportunity Phishing via WhatsApp | PuTTY Utility

September 14, 2022May 24, 2024 GoogleCloudIntel

In July 2022, during proactive threat hunting activities at a company in the media industry, Mandiant Managed Defense identified a novel spear phish methodology employed by the threat cluster tracked as UNC4034. Mandiant has identified several overlaps between this group and those we suspect have a North Korea nexus.

UNC4034 established communication…

Read More

Posts pagination

Previous 1 … 274 275 276 … 284 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian
Support this website

Website Disclaimer