Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 225 followers

Latest posts

Last updated 6 days ago

AI and collaboration tools: how cyberattackers are targeting SMBs in 2025

6 days ago

Cyberattackers often view small and medium-sized businesses (SMBs) as easier targets, assuming...

SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play

8 days ago

In January 2025, we uncovered the SparkCat spyware campaign, which was aimed...

Toxic trend: Another malware threat targets DeepSeek

20 days ago

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users...

Sleep with one eye open: how Librarian Ghouls steal data by night

22 days ago

Introduction Librarian Ghouls, also known as “Rare Werewolf” and “Rezet”, is an...

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

25 days ago

The abuse of known security flaws to deploy bots on vulnerable systems...

IT threat evolution in Q1 2025. Non-mobile statistics

26 days ago

IT threat evolution in Q1 2025. Non-mobile statistics IT threat evolution in...

IT threat evolution in Q1 2025. Mobile statistics

26 days ago

IT threat evolution in Q1 2025. Mobile statistics IT threat evolution in...

Host-based logs, container-based threats: How to tell where an attack began

28 days ago

The risks associated with containerized environments Although containers provide an isolated runtime...

Exploits and vulnerabilities in Q1 2025

about 1 month ago

The first quarter of 2025 saw the continued publication of vulnerabilities discovered...

Zanubis in motion: Tracing the active evolution of the Android banking malware

about 1 month ago

Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022...

Dero miner zombies biting through Docker APIs to build a cryptojacking horde

about 1 month ago

Introduction Imagine a container zombie outbreak where a single infected container scans...

Threat landscape for industrial automation systems in Q1 2025

about 2 months ago

Trends Relative stability from quarter to quarter. The percentage of ICS computers...