Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securelist.com

Securelist - Information about Viruses, Hackers and Spam

Get the latest updates from Securelist - Information about Viruses, Hackers and Spam directly as they happen.

Follow now 198 followers

Latest posts

Last updated 1 day ago

Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses

1 day ago

Introduction Organizations often rely on a layered defense strategy, yet breaches still...

Lumma/Amadey: fake CAPTCHAs want to know if you’re human

1 day ago

Attackers are increasingly distributing malware through a rather unusual method: a fake...

The Crypto Game of Lazarus APT: Investors vs. Zero-days

8 days ago

Introduction Lazarus APT and its BlueNoroff subgroup are a highly sophisticated and...

Grandoreiro, the global trojan with grandiose ambitions

8 days ago

Grandoreiro is a well-known Brazilian banking trojan — part of the Tetrade...

Stealer here, stealer there, stealers everywhere!

10 days ago

Introduction Information stealers, which are used to collect credentials to then sell...

Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia

13 days ago

Last December, we discovered a new group targeting Russian businesses and government...

SAS CTF and the many ways to persist a kernel shellcode on Windows 7

14 days ago

On May 18, 2024, Kaspersky’s Global Research & Analysis Team (GReAT), with...

Beyond the Surface: the evolution and expansion of the SideWinder APT group

16 days ago

SideWinder, aka T-APT-04 or RattleSnake, is one of the most prolific APT...

Whispers from the Dark Web Cave. Cyberthreats in the Middle East

17 days ago

The Kaspersky Digital Footprint Intelligence team analyzed cybersecurity threats coming from dark...

Awaken Likho is awake: new techniques of an APT group

24 days ago

Introduction In July 2021, a campaign was launched primarily targeting Russian government...

Scam Information and Event Management

27 days ago

While trying to deliver malware on victims’ devices and stay on them...

Finding a needle in a haystack: Machine learning at the forefront of threat hunting research

29 days ago

Introduction In the ever-evolving landscape of cybersecurity, logs, that is information collected...