Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Malware Descriptions
Malware Descriptions
securelist.com
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware – Source: securelist.com
securelist.com
SoumniBot: the new Android banker’s unique techniques – Source: securelist.com
securelist.com
Using the LockBit builder to generate targeted ransomware – Source: securelist.com
securelist.com
XZ backdoor story – Initial analysis – Source: securelist.com
securelist.com
DinodasRAT Linux implant targeting entities worldwide – Source: securelist.com
securelist.com
What’s in your notepad? Infected text editors target Chinese users – Source: securelist.com
securelist.com
Coyote: A multi-stage banking Trojan abusing the Squirrel installer – Source: securelist.com
securelist.com
Cracked software beats gold: new macOS backdoor stealing cryptowallets – Source: securelist.com
securelist.com
A cryptor, a stealer and a banking trojan – Source: securelist.com
securelist.com
Free Download Manager backdoored – a possible supply chain attack on Linux machines – Source:...
securelist.com
From Caribbean shores to your devices: analyzing Cuba ransomware – Source: securelist.com
securelist.com
Evil Telegram doppelganger attacks Chinese users – Source: securelist.com
securelist.com
IT threat evolution in Q2 2023 – Source: securelist.com
securelist.com
Lockbit leak, research opportunities on tools leaked from TAs – Source: securelist.com
securelist.com
Focus on DroxiDat/SystemBC – Source: securelist.com
securelist.com
Common TTPs of attacks against industrial organizations – Source: securelist.com
securelist.com
What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot – Source: securelist.com
securelist.com
Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability – Source: securelist.com
securelist.com
Andariel’s silly mistakes and a new malware family – Source: securelist.com
securelist.com
LockBit Green and phishing that targets organizations – Source: securelist.com
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
securelist.com
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency – Source: securelist.com
securelist.com
IT threat evolution Q1 2023 – Source: securelist.com
securelist.com
IT threat evolution Q1 2023. Mobile statistics – Source: securelist.com
securelist.com
Satacom delivers browser extension that steals cryptocurrency – Source: securelist.com
securelist.com
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
securelist.com
CloudWizard APT: the bad magic story goes on – Source: securelist.com
securelist.com
Minas – on the way to complexity – Source: securelist.com
securelist.com
New ransomware trends in 2023 – Source: securelist.com
securelist.com
Not quite an Easter egg: a new family of Trojan subscribers on Google Play –...
Posts navigation
1
2
Latest Cyber News
Data Breach Today
Ransomware Victims Who Pay a Ransom Drops to Record Low – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks...
19/04/2024
Data Breach Today
Live Webinar | Human Detection & Response: Exploring Three Security Awareness Realities – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Dark Web Sales Driving Major Rise in Credential Attacks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Hacking the Floodgates: U.S. Dams Face Growing Cyber Threats – Source: www.databreachtoday.com
19/04/2024