Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 518 followers

Latest posts

Last updated about 12 hours ago

Forensic journey: Breaking down the UserAssist artifact structure

about 13 hours ago

Introduction As members of the Global Emergency Response Team (GERT), we work...

Code highlighting with Cursor AI for $500,000

4 days ago

Attacks that leverage malicious open-source packages are becoming a major and growing...

Approach to mainframe penetration testing on z/OS. Deep dive into RACF

7 days ago

In our previous article we dissected penetration testing techniques for IBM z/OS...

Batavia spyware steals data from Russian organizations

8 days ago

Introduction Since early March 2025, our systems have recorded an increase in...

AI and collaboration tools: how cyberattackers are targeting SMBs in 2025

20 days ago

Cyberattackers often view small and medium-sized businesses (SMBs) as easier targets, assuming...

SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play

22 days ago

In January 2025, we uncovered the SparkCat spyware campaign, which was aimed...

Toxic trend: Another malware threat targets DeepSeek

about 1 month ago

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users...

Sleep with one eye open: how Librarian Ghouls steal data by night

about 1 month ago

Introduction Librarian Ghouls, also known as “Rare Werewolf” and “Rezet”, is an...

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

about 1 month ago

The abuse of known security flaws to deploy bots on vulnerable systems...

IT threat evolution in Q1 2025. Non-mobile statistics

about 1 month ago

IT threat evolution in Q1 2025. Non-mobile statistics IT threat evolution in...

IT threat evolution in Q1 2025. Mobile statistics

about 1 month ago

IT threat evolution in Q1 2025. Mobile statistics IT threat evolution in...

Host-based logs, container-based threats: How to tell where an attack began

about 1 month ago

The risks associated with containerized environments Although containers provide an isolated runtime...