Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 544 followers

Latest posts

Last updated 3 days ago

How we trained an ML model to detect DLL hijacking

3 days ago

DLL hijacking is a common technique in which attackers replace a library...

Detecting DLL hijacking with machine learning: real-world cases

3 days ago

Introduction Our colleagues from the AI expertise center recently developed a machine-learning...

Forensic journey: hunting evil within AmCache

8 days ago

Introduction When it comes to digital forensics, AmCache plays a vital role...

Massive npm infection: the Shai-Hulud worm and patient zero

14 days ago

Introduction The modern development world is almost entirely dependent on third-party modules...

Threat landscape for industrial automation systems in Q2 2025

20 days ago

Statistics across all threats In Q2 2025, the percentage of ICS computers...

RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT

23 days ago

Background RevengeHotels, also known as TA558, is a threat group that has...

Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers

24 days ago

Introduction In this article, we explore how the Model Context Protocol (MCP)...

Notes of cyber inspector: three clusters of threat in cyberspace

28 days ago

Hacktivism and geopolitically motivated APT groups have become a significant threat to...

IT threat evolution in Q2 2025. Mobile statistics

about 1 month ago

IT threat evolution in Q2 2025. Mobile statistics IT threat evolution in...

IT threat evolution in Q2 2025. Non-mobile statistics

about 1 month ago

IT threat evolution in Q2 2025. Non-mobile statistics IT threat evolution in...

Cookies and how to bake them: what they are for, associated risks, and what session hijacking has to do with it

about 1 month ago

When you visit almost any website, you’ll see a pop-up asking you...

How attackers adapt to built-in macOS protection

about 1 month ago

If a system is popular with users, you can bet it’s just...