Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 230 followers

Latest posts

Last updated 3 days ago

Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs

3 days ago

Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire...

Mem3nt0 mori – The Hacking Team is back!

4 days ago

In March 2025, Kaspersky detected a wave of infections that occurred when...

Deep analysis of the flaw in BetterBank reward logic

8 days ago

Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance...

The evolving landscape of email phishing attacks: how threat actors are reusing and refining established techniques

9 days ago

Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat...

PassiveNeuron: a sophisticated campaign targeting servers of high-profile organizations

9 days ago

Introduction Back in 2024, we gave a brief description of a complex...

Post-exploitation framework now also delivered via npm

13 days ago

Incident description The first version of the AdaptixC2 post-exploitation framework, which can...

SEO spam and hidden links: how to protect your website and your reputation

13 days ago

When analyzing the content of websites in an attempt to determine what...

Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution

15 days ago

A malware campaign was recently detected in Brazil, distributing a malicious LNK...

Mysterious Elephant: a growing threat

15 days ago

Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group...

Signal in the noise: what hashtags reveal about hacktivism in 2025

16 days ago

What do hacktivist campaigns look like in 2025? To answer this question...

The king is dead, long live the king! Windows 10 EOL and Windows 11 forensic artifacts

16 days ago

Introduction Windows 11 was released a few years ago, yet it has...

How we trained an ML model to detect DLL hijacking

24 days ago

DLL hijacking is a common technique in which attackers replace a library...