Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

Tag: VULNERABILITY

Threat Research

Decrypted: MafiaWare666 Ransomware – Avast Threat Labs

September 29, 2022May 24, 2024 Securonix

Avast releases a MafiaWare666 ransomware decryption tool. MafiaWare666 is also known as JCrypt, RIP Lmao, BrutusptCrypt or Hades. Skip to how to use the MafiaWare666

Read More
Threat Research

Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

September 28, 2022May 24, 2024 Securonix

ESET researchers uncovered and analyzed a set of malicious tools that were used by the infamous Lazarus APT group in attacks during the autumn of

Read More
Threat Research

DeftTorero TTPs in 2019–2021

September 27, 2022May 24, 2024 Securonix

Earlier this year, we started hunting for possible new DeftTorero (aka Lebanese Cedar, Volatile Cedar) artifacts. This threat actor is believed to originate from the

Read More
Threat Research

Revealing Emperor Dragonfly: Night Sky and Cheerscrypt – A Single Ransomware Group – Sygnia

September 26, 2022May 24, 2024 Securonix

Key Takeaways Sygnia recently investigated a Cheerscrypt ransomware attack which utilized Night Sky ransomware TTPs. Further analysis       revealed that Cheerscrypt and Night Sky

Read More
Threat Research

WARNING: NEW ATTACK CAMPAIGN UTILIZED A NEW 0-DAY RCE VULNERABILITY ON MICROSOFT EXCHANGE SERVER

September 23, 2022May 24, 2024 Securonix

Circa the beginning of August 2022, while doing security monitoring & incident response services, GTSC SOC team discovered that a critical infrastructure was being attacked,

Read More
Threat Research

Chinese State-Sponsored Group TA413 Adopts New Capabilities in Pursuit of Tibetan Targets | Recorded Future

September 19, 2022May 24, 2024 Securonix

Editor’s Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a

Read More
Threat Research

Iranian State Actors Conduct Cyber Operations Against the Government of Albania | CISA

September 15, 2022May 24, 2024 Securonix

Summary The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory to provide information on

Read More
Threat Research

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

September 15, 2022May 24, 2024 Securonix

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining. We observed

Read More
Threat Research

Ransomware Roundup: Ragnar Locker Ransomware | FortiGuard Labs

September 14, 2022May 24, 2024 Securonix

On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within the OSINT community and our datasets.

Read More
Threat Research

Excel Document Delivers Multiple Malware By Exploiting CVE-2017-11882 – Part I | Fortinet Blog

September 13, 2022May 24, 2024 Securonix

FortiGuard Labs recently captured an Excel document with an embedded file in the wild. Of course, we do this all the time. What caught my

Read More
Threat Research

Threat Alert: New Malware in the Cloud By TeamTNT

September 13, 2022May 12, 2025 Aquasec

Over the past week we observed three different attacks on our honeypots. The scripts and malware that were used bear a striking resemblance to none

Read More
Threat Research

Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations | CISA

September 8, 2022May 24, 2024 Securonix

Summary Actions to take today to protect against ransom operations: • Keep systems and software updated and prioritize remediating known exploited vulnerabilities.• Enforce MFA.• Make

Read More
Threat Research

Malicious Word Document with a Frameset

September 8, 2022May 24, 2024 Securonix

This is definitively new, but I did not see this type of document for a while. I spotted a malicious Word OOXML document (the new

Read More
Threat Research

THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence

September 7, 2022May 24, 2024 Securonix

Cybereason GSOC team analysts have analyzed a specific technique that leverages Notepad++ plugins to persist and evade security mechanisms on a machine. Following this introduction,

Read More
Threat Research

A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities

September 6, 2022May 24, 2024 Securonix

This blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected and blocked the abuse of the

Read More

Posts pagination

Previous 1 … 329 330 331 … 338 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian
Support this website

Website Disclaimer