Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 545 followers

Latest posts

Last updated 1 day ago

Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution

1 day ago

A malware campaign was recently detected in Brazil, distributing a malicious LNK...

Mysterious Elephant: a growing threat

1 day ago

Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group...

Signal in the noise: what hashtags reveal about hacktivism in 2025

2 days ago

What do hacktivist campaigns look like in 2025? To answer this question...

The king is dead, long live the king! Windows 10 EOL and Windows 11 forensic artifacts

3 days ago

Introduction Windows 11 was released a few years ago, yet it has...

How we trained an ML model to detect DLL hijacking

11 days ago

DLL hijacking is a common technique in which attackers replace a library...

Detecting DLL hijacking with machine learning: real-world cases

11 days ago

Introduction Our colleagues from the AI expertise center recently developed a machine-learning...

Forensic journey: hunting evil within AmCache

15 days ago

Introduction When it comes to digital forensics, AmCache plays a vital role...

Massive npm infection: the Shai-Hulud worm and patient zero

21 days ago

Introduction The modern development world is almost entirely dependent on third-party modules...

Threat landscape for industrial automation systems in Q2 2025

27 days ago

Statistics across all threats In Q2 2025, the percentage of ICS computers...

RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT

about 1 month ago

Background RevengeHotels, also known as TA558, is a threat group that has...

Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers

about 1 month ago

Introduction In this article, we explore how the Model Context Protocol (MCP)...

Notes of cyber inspector: three clusters of threat in cyberspace

about 1 month ago

Hacktivism and geopolitically motivated APT groups have become a significant threat to...