Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 556 followers

Latest posts

Last updated about 4 hours ago

Assessing SIEM effectiveness

about 4 hours ago

A SIEM is a complex system offering broad and flexible threat detection...

From cheats to exploits: Webrat spreading via GitHub

about 8 hours ago

In early 2025, security researchers uncovered a new malware family named Webrat...

Cloud Atlas activity in the first half of 2025: what changed

4 days ago

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe...

Yet another DCOM object for lateral movement

4 days ago

Introduction If you’re a penetration tester, you know that lateral movement is...

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

6 days ago

Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated...

God Mode On: how we attacked a vehicle’s head unit modem

7 days ago

Introduction Imagine you’re cruising down the highway in your brand-new electric car...

Frogblight threatens you with a court case: a new Android banker targets Turkish users

8 days ago

In August 2025, we discovered a campaign targeting individuals in Turkey with...

Following the digital trail: what happens to data stolen in a phishing attack

11 days ago

Introduction A typical phishing attack involves a user clicking a fraudulent link...

Turn me on, turn me off: Zigbee assessment in industrial environments

11 days ago

We all encounter IoT and home automation in some form or another...

Hunting for Mythic in network traffic

12 days ago

Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain...

It didn’t take long: CVE-2025-55182 is now under active exploitation

12 days ago

On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182...

Goodbye, dark Telegram: Blocks are pushing the underground out

14 days ago

Telegram has won over users worldwide, and cybercriminals are no exception. While...