Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 556 followers

Latest posts

Last updated about 8 hours ago

Cloud Atlas activity in the first half of 2025: what changed

about 8 hours ago

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe...

Yet another DCOM object for lateral movement

about 10 hours ago

Introduction If you’re a penetration tester, you know that lateral movement is...

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

2 days ago

Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated...

God Mode On: how we attacked a vehicle’s head unit modem

3 days ago

Introduction Imagine you’re cruising down the highway in your brand-new electric car...

Frogblight threatens you with a court case: a new Android banker targets Turkish users

4 days ago

In August 2025, we discovered a campaign targeting individuals in Turkey with...

Following the digital trail: what happens to data stolen in a phishing attack

7 days ago

Introduction A typical phishing attack involves a user clicking a fraudulent link...

Turn me on, turn me off: Zigbee assessment in industrial environments

7 days ago

We all encounter IoT and home automation in some form or another...

Hunting for Mythic in network traffic

8 days ago

Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain...

It didn’t take long: CVE-2025-55182 is now under active exploitation

8 days ago

On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182...

Goodbye, dark Telegram: Blocks are pushing the underground out

10 days ago

Telegram has won over users worldwide, and cybercriminals are no exception. While...

Shai Hulud 2.0, now with a wiper flavor

16 days ago

In September, a new breed of malware distributed via compromised Node Package...

Exploits and vulnerabilities in Q3 2025

16 days ago

In the third quarter, attackers continued to exploit security flaws in WinRAR...