Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder


Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 112 followers

Latest posts

Last updated 6 days ago

Lookalike domains and how to outfox them

6 days ago

Our colleagues already delved into how cybercriminals attack companies through compromised email...

IT threat evolution Q3 2020. Non-mobile statistics

10 days ago

These statistics are based on detection verdicts of Kaspersky products received from...

IT threat evolution Q3 2020 Mobile statistics

10 days ago

The statistics presented here draw on detection verdicts returned by Kaspersky products...

IT threat evolution Q3 2020

10 days ago

Targeted attacks MATA: Lazarus’s multi-platform targeted malware framework The more sophisticated threat...

Advanced Threat predictions for 2021

11 days ago

Trying to make predictions about the future is a tricky business. However...

Spam and phishing in Q3 2020

18 days ago

Quarterly highlights Worming their way in: cybercriminal tricks of the trade These...

Targeted ransomware: it’s not just about encrypting your data!

19 days ago

When we talk about ransomware, we need to draw a line between...

Ghimob: a Tétrade threat actor moves to infect mobile devices

21 days ago

Guildma, a threat actor that is part of the Tétrade family of...

RansomEXX Trojan attacks Linux systems

24 days ago

We recently discovered a new file-encrypting Trojan built as an ELF executable...

Attacks on industrial enterprises using RMS and TeamViewer: new data

25 days ago

 Download full report (PDF) Executive Summary In summer 2019, Kaspersky ICS CERT...

APT trends report Q3 2020

27 days ago

For more than three years, the Global Research and Analysis Team (GReAT)...

DDoS attacks in Q3 2020

about 1 month ago

News overview Q3 was relatively calm from a DDoS perspective. There were...