Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 231 followers

Latest posts

Last updated about 12 hours ago

The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor

about 12 hours ago

Overview of the attacks In mid-2025, we identified a malicious driver file...

Threat landscape for industrial automation systems in Q3 2025

5 days ago

Statistics across all threats In Q3 2025, the percentage of ICS computers...

Evasive Panda APT poisons DNS requests to deliver MgBot

6 days ago

Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly...

Assessing SIEM effectiveness

6 days ago

A SIEM is a complex system offering broad and flexible threat detection...

From cheats to exploits: Webrat spreading via GitHub

7 days ago

In early 2025, security researchers uncovered a new malware family named Webrat...

Cloud Atlas activity in the first half of 2025: what changed

11 days ago

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe...

Yet another DCOM object for lateral movement

11 days ago

Introduction If you’re a penetration tester, you know that lateral movement is...

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

13 days ago

Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated...

God Mode On: how we attacked a vehicle’s head unit modem

14 days ago

Introduction Imagine you’re cruising down the highway in your brand-new electric car...

Frogblight threatens you with a court case: a new Android banker targets Turkish users

15 days ago

In August 2025, we discovered a campaign targeting individuals in Turkey with...

Following the digital trail: what happens to data stolen in a phishing attack

18 days ago

Introduction A typical phishing attack involves a user clicking a fraudulent link...

Turn me on, turn me off: Zigbee assessment in industrial environments

18 days ago

We all encounter IoT and home automation in some form or another...