Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 224 followers

Latest posts

Last updated 11 days ago

Toxic trend: Another malware threat targets DeepSeek

11 days ago

Introduction DeepSeek-R1 is one of the most popular LLMs right now. Users...

Sleep with one eye open: how Librarian Ghouls steal data by night

13 days ago

Introduction Librarian Ghouls, also known as “Rare Werewolf” and “Rezet”, is an...

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

16 days ago

The abuse of known security flaws to deploy bots on vulnerable systems...

IT threat evolution in Q1 2025. Non-mobile statistics

17 days ago

IT threat evolution in Q1 2025. Non-mobile statistics IT threat evolution in...

IT threat evolution in Q1 2025. Mobile statistics

17 days ago

IT threat evolution in Q1 2025. Mobile statistics IT threat evolution in...

Host-based logs, container-based threats: How to tell where an attack began

19 days ago

The risks associated with containerized environments Although containers provide an isolated runtime...

Exploits and vulnerabilities in Q1 2025

23 days ago

The first quarter of 2025 saw the continued publication of vulnerabilities discovered...

Zanubis in motion: Tracing the active evolution of the Android banking malware

25 days ago

Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022...

Dero miner zombies biting through Docker APIs to build a cryptojacking horde

about 1 month ago

Introduction Imagine a container zombie outbreak where a single infected container scans...

Threat landscape for industrial automation systems in Q1 2025

about 1 month ago

Trends Relative stability from quarter to quarter. The percentage of ICS computers...

Using a Mythic agent to optimize penetration testing

about 1 month ago

Introduction The way threat actors use post-exploitation frameworks in their attacks is...

State of ransomware in 2025

about 2 months ago

Global ransomware trends and numbers With the International Anti-Ransomware Day just around...