Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
BellaCPP: Discovering a new BellaCiao variant written in C++ – Source: securelist.com
Source: securelist.com - Author: Mert Degirmenci Introduction BellaCiao is a .NET-based malware family that adds a...
securelist.com
Attackers exploiting a patched FortiClient EMS vulnerability in the wild – Source: securelist.com
Source: securelist.com - Author: Ashley Muñoz, Francesco Figurelli, Cristian Souza, Eduardo Ovalle, Areg Baghinyan Introduction During...
securelist.com
Lazarus group evolves its infection chain with old and new malware – Source: securelist.com
Source: securelist.com - Author: Vasily Berdnikov, Sojun Ryu Over the past few years, the Lazarus group...
securelist.com
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations – Source: securelist.com
Source: securelist.com - Author: Kaspersky About C.A.S C.A.S (Cyber Anarchy Squad) is a hacktivist group that...
securelist.com
Download a banker to track your parcel – Source: securelist.com
Source: securelist.com - Author: Dmitry Kalinin In late October 2024, a new scheme for distributing a...
securelist.com
Dark web threats and dark market predictions for 2025 – Source: securelist.com
Source: securelist.com - Author: Alexander Zabrovsky, Sergey Lozhkin Review of last year’s predictions The number of...
securelist.com
Careto is back: what’s new after 10 years of silence? – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Marc Rivero During the first week of October, Kaspersky took...
securelist.com
Story of the Year: global IT outages and supply chain attacks – Source: securelist.com
Source: securelist.com - Author: Alexander Liskin, Vladimir Kuskov, Igor Kuznetsov, Vitaly Kamluk A faulty update by...
securelist.com
Exploits and vulnerabilities in Q3 2024 – Source: securelist.com
Source: securelist.com - Author: Alexander Kolesnikov Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux...
securelist.com
Our secret ingredient for reverse engineering – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin Nowadays, a lot of cybersecurity professionals use IDA Pro as...
securelist.com
Kaspersky Security Bulletin 2024. Statistics – Source: securelist.com
Source: securelist.com - Author: AMR Kaspersky Security Bulletin All statistics in this report come from Kaspersky...
securelist.com
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT – Source: securelist.com
Source: securelist.com - Author: Artem Ushkov Recent months have seen a surge in mailings with lookalike...
securelist.com
IT threat evolution in Q3 2024. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q3 2024 IT threat evolution in Q3...
securelist.com
IT threat evolution in Q3 2024. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution in Q3 2024 IT threat evolution in...
securelist.com
IT threat evolution Q3 2024 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q3 2024 IT threat evolution in...
securelist.com
APT trends report Q3 2024 – Source: securelist.com
Source: securelist.com - Author: GReAT Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly...
securelist.com
Consumer and privacy predictions for 2025 – Source: securelist.com
Source: securelist.com - Author: Anna Larkina, Vladislav Tushkanov, Roman Dedenok, Dmitry Anikin, Dmitry Momotov Overview of...
securelist.com
Analysis of Elpaco: a Mimic variant – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Timofey Ezhov, Eduardo Ovalle, Ashley Muñoz Introduction In a recent...
securelist.com
Advanced threat predictions for 2025 – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Giampaolo Dedola, Georgy Kucherin, Maher Yamout, Vasily Berdnikov, Isabel Manjarrez,...
securelist.com
Scammer Black Friday offers: Online shopping threats and dark web sales – Source: securelist.com
Source: securelist.com - Author: Kaspersky Intro The e-commerce market continues to grow every year. According to...
securelist.com
Сrimeware and financial cyberthreats in 2025 – Source: securelist.com
Source: securelist.com - Author: GReAT Kaspersky Security Bulletin Kaspersky’s Global Research and Analysis Team constantly monitors...
securelist.com
Threats in space (or rather, on Earth): internet-exposed GNSS receivers – Source: securelist.com
Source: securelist.com - Author: Isabel Manjarrez What is GNSS? Global Navigation Satellite Systems (GNSS) are collections,...
securelist.com
Ymir: new stealthy ransomware in the wild – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Ashley Muñoz, Eduardo Ovalle Introduction In a recent incident response...
securelist.com
QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns – Source: securelist.com
Source: securelist.com - Author: Saurabh Sharma Introduction In 2021, we began to investigate an attack on...
securelist.com
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency – Source: securelist.com
Source: securelist.com - Author: Kirill Korchemny Introduction In August 2024, our team identified a new crimeware...
securelist.com
Loose-lipped neural networks and lazy scammers – Source: securelist.com
Source: securelist.com - Author: Vladislav Tushkanov One topic being actively researched in connection with the breakout...
securelist.com
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses – Source: securelist.com
Source: securelist.com - Author: Victor Sergeev, Amged Wageh, Ahmed Khlief Introduction Organizations often rely on a...
securelist.com
Lumma/Amadey: fake CAPTCHAs want to know if you’re human – Source: securelist.com
Source: securelist.com - Author: Vasily Kolesnikov Attackers are increasingly distributing malware through a rather unusual method:...
securelist.com
The Crypto Game of Lazarus APT: Investors vs. Zero-days – Source: securelist.com
Source: securelist.com - Author: Boris Larin, Vasily Berdnikov Introduction Lazarus APT and its BlueNoroff subgroup are...
securelist.com
Grandoreiro, the global trojan with grandiose goals – Source: securelist.com
Source: securelist.com - Author: GReAT Grandoreiro is a well-known Brazilian banking trojan — part of the...
Posts navigation
1
2
…
5
Latest News
CSO - Online
So entgiften Sie Ihre Sicherheitskultur – Source: www.csoonline.com
19/12/2024
CSO - Online
Top security solutions being piloted today — and how to do it right – Source: www.csoonline.com
19/12/2024
CSO - Online
Die 10 häufigsten LLM-Schwachstellen – Source: www.csoonline.com
19/12/2024
CSO - Online
Sehr geehrter CEO, – Source: www.csoonline.com
19/12/2024
CSO - Online
European authorities say AI can use personal data without consent for training – Source: www.csoonline.com
19/12/2024
securelist.com
Attackers exploiting a patched FortiClient EMS vulnerability in the wild – Source: securelist.com
19/12/2024