Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 499 followers

Latest posts

Last updated 2 days ago

State of ransomware in 2025

2 days ago

Global ransomware trends and numbers With the International Anti-Ransomware Day just around...

Outlaw cybergang attacking targets worldwide

10 days ago

Introduction In a recent incident response case in Brazil, we dealt with...

Triada strikes back

14 days ago

Introduction Older versions of Android contained various vulnerabilities that allowed gaining root...

Operation SyncHole: Lazarus APT goes back to the well

15 days ago

We have been tracking the latest attack campaign by the Lazarus group...

Russian organizations targeted by backdoor masquerading as secure networking software updates

17 days ago

As we were looking into a cyberincident in April 2025, we uncovered...

Lumma Stealer – Tracking distribution channels

18 days ago

Introduction The evolution of Malware-as-a-Service (MaaS) has significantly lowered the barriers to...

Phishing attacks leveraging HTML code inside SVG files

18 days ago

With each passing year, phishing attacks feature more and more elaborate techniques...

IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia

22 days ago

Day after day, threat actors create new malware to use in cyberattacks...

Streamlining detection engineering in security operation centers

23 days ago

Security operations centers (SOCs) exist to protect organizations from cyberthreats by detecting...

GOFFEE continues to attack organizations in Russia

29 days ago

GOFFEE is a threat actor that first came to our attention in...

Attackers distributing a miner and the ClipBanker Trojan via SourceForge

about 1 month ago

Recently, we noticed a rather unique scheme for distributing malware that exploits...

How ToddyCat tried to hide behind AV software

about 1 month ago

To hide their activity in infected systems, APT groups resort to various...