Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 557 followers

Latest posts

Last updated 1 day ago

The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor

1 day ago

Overview of the attacks In mid-2025, we identified a malicious driver file...

Threat landscape for industrial automation systems in Q3 2025

6 days ago

Statistics across all threats In Q3 2025, the percentage of ICS computers...

Evasive Panda APT poisons DNS requests to deliver MgBot

7 days ago

Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly...

Assessing SIEM effectiveness

7 days ago

A SIEM is a complex system offering broad and flexible threat detection...

From cheats to exploits: Webrat spreading via GitHub

8 days ago

In early 2025, security researchers uncovered a new malware family named Webrat...

Cloud Atlas activity in the first half of 2025: what changed

12 days ago

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe...

Yet another DCOM object for lateral movement

12 days ago

Introduction If you’re a penetration tester, you know that lateral movement is...

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

14 days ago

Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated...

God Mode On: how we attacked a vehicle’s head unit modem

15 days ago

Introduction Imagine you’re cruising down the highway in your brand-new electric car...

Frogblight threatens you with a court case: a new Android banker targets Turkish users

16 days ago

In August 2025, we discovered a campaign targeting individuals in Turkey with...

Following the digital trail: what happens to data stolen in a phishing attack

19 days ago

Introduction A typical phishing attack involves a user clicking a fraudulent link...

Turn me on, turn me off: Zigbee assessment in industrial environments

19 days ago

We all encounter IoT and home automation in some form or another...