Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 231 followers

Latest posts

Last updated about 15 hours ago

Threat landscape for industrial automation systems in Q3 2025

about 15 hours ago

Statistics across all threats In Q3 2025, the percentage of ICS computers...

Evasive Panda APT poisons DNS requests to deliver MgBot

1 day ago

Introduction The Evasive Panda APT group (also known as Bronze Highland, Daggerfly...

Assessing SIEM effectiveness

3 days ago

A SIEM is a complex system offering broad and flexible threat detection...

From cheats to exploits: Webrat spreading via GitHub

3 days ago

In early 2025, security researchers uncovered a new malware family named Webrat...

Cloud Atlas activity in the first half of 2025: what changed

7 days ago

Known since 2014, the Cloud Atlas group targets countries in Eastern Europe...

Yet another DCOM object for lateral movement

7 days ago

Introduction If you’re a penetration tester, you know that lateral movement is...

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

9 days ago

Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated...

God Mode On: how we attacked a vehicle’s head unit modem

10 days ago

Introduction Imagine you’re cruising down the highway in your brand-new electric car...

Frogblight threatens you with a court case: a new Android banker targets Turkish users

11 days ago

In August 2025, we discovered a campaign targeting individuals in Turkey with...

Following the digital trail: what happens to data stolen in a phishing attack

14 days ago

Introduction A typical phishing attack involves a user clicking a fraudulent link...

Turn me on, turn me off: Zigbee assessment in industrial environments

14 days ago

We all encounter IoT and home automation in some form or another...

Hunting for Mythic in network traffic

15 days ago

Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain...