Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 231 followers

Latest posts

Last updated about 13 hours ago

Evasive Panda APT poisons DNS requests to deliver MgBot

about 13 hours ago

Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly...

Assessing SIEM effectiveness

1 day ago

A SIEM is a complex system offering broad and flexible threat detection...

From cheats to exploits: Webrat spreading via GitHub

1 day ago

In early 2025, security researchers uncovered a new malware family named Webrat...

Cloud Atlas activity in the first half of 2025: what changed

5 days ago

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe...

Yet another DCOM object for lateral movement

6 days ago

Introduction If you’re a penetration tester, you know that lateral movement is...

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

7 days ago

Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated...

God Mode On: how we attacked a vehicle’s head unit modem

8 days ago

Introduction Imagine you’re cruising down the highway in your brand-new electric car...

Frogblight threatens you with a court case: a new Android banker targets Turkish users

10 days ago

In August 2025, we discovered a campaign targeting individuals in Turkey with...

Following the digital trail: what happens to data stolen in a phishing attack

12 days ago

Introduction A typical phishing attack involves a user clicking a fraudulent link...

Turn me on, turn me off: Zigbee assessment in industrial environments

13 days ago

We all encounter IoT and home automation in some form or another...

Hunting for Mythic in network traffic

13 days ago

Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain...

It didn’t take long: CVE-2025-55182 is now under active exploitation

14 days ago

On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182...