Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 528 followers

Latest posts

Last updated about 14 hours ago

Modern vehicle cybersecurity trends

about 14 hours ago

Modern vehicles are transforming into full-fledged digital devices that offer a multitude...

GodRAT – New RAT targeting financial institutions

4 days ago

Summary In September 2024, we detected malicious activity targeting financial (trading and...

Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824

5 days ago

In April 2025, Microsoft patched 121 vulnerabilities in its products. According to...

New trends in phishing and scams: how AI and social media are changing the game

10 days ago

Introduction Phishing and scams are dynamic types of online fraud that primarily...

Scammers mass-mailing the Efimer Trojan to steal crypto

15 days ago

Introduction In June, we encountered a mass mailing campaign impersonating lawyers from...

Driver of destruction: How a legitimate driver is being used to take down AV processes

17 days ago

Introduction In a recent incident response case in Brazil, we spotted intriguing...

Cobalt Strike Beacon delivered via GitHub and social media

24 days ago

Introduction In the latter half of 2024, the Russian IT industry, alongside...

ToolShell: a story of five vulnerabilities in Microsoft SharePoint

29 days ago

On July 19–20, 2025, various security companies and national CERTs published alerts...

Rumble in the jungle: APT41’s new target in Africa

about 1 month ago

Introduction Some time ago, Kaspersky MDR analysts detected a targeted attack against...

GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia

about 1 month ago

In a recent incident response (IR) case, we discovered highly customized malware...

Forensic journey: Breaking down the UserAssist artifact structure

about 1 month ago

Introduction As members of the Global Emergency Response Team (GERT), we work...

Code highlighting with Cursor AI for $500,000

about 1 month ago

Attacks that leverage malicious open-source packages are becoming a major and growing...