Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
Home
securelist.com
securelist.com
securelist.com
Trusted relationship attacks: trust, but verify – Source: securelist.com
Source: securelist.com - Author: Dmitry Kachan, Alina Sukhanova IT outsourcing market continues to demonstrate strong growth...
securelist.com
Message board scams – Source: securelist.com
Source: securelist.com - Author: CFR team Marketplace fraud is nothing new. Cybercriminals swindle money out of...
securelist.com
Threat landscape for industrial automation systems, Q1 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Global statistics Statistics across all threats In the first...
securelist.com
ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Eduardo Ovalle, Ashley Muñoz, Christopher Zachor Introduction Attackers always find...
securelist.com
A journey into forgotten Null Session and MS-RPC interfaces – Source: securelist.com
Source: securelist.com - Author: Haidar Kabibo A journey into forgotten Null Session and MS-RPC interfaces (PDF)...
securelist.com
Stealers, stealers and more stealers – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Stealers are a prominent threat in the malware landscape. Over...
securelist.com
QakBot attacks with Windows zero-day (CVE-2024-30051) – Source: securelist.com
Source: securelist.com - Author: Boris Larin, Mert Degirmenci Software Software 14 May 2024 minute read In...
securelist.com
Incident response analyst report 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky GERT, Kaspersky Security Services SOC, TI and IR posts SOC, TI...
securelist.com
APT trends report Q1 2024 – Source: securelist.com
Source: securelist.com - Author: GReAT For more than six years, the Global Research and Analysis Team...
securelist.com
State of ransomware in 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Ransomware attacks continue to be one of the biggest contemporary cybersecurity...
securelist.com
Exploits and vulnerabilities in Q1 2024 – Source: securelist.com
Source: securelist.com - Author: Alexander Kolesnikov, Vitaly Morgunov We at Kaspersky continuously monitor the evolving cyberthreat...
securelist.com
Financial cyberthreats in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Money is what always attracts cybercriminals. A significant share of scam,...
securelist.com
Managed Detection and Response in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Security Services Managed Detection and Response in 2023 (PDF) Alongside other...
securelist.com
ToddyCat is making holes in your infrastructure – Source: securelist.com
Source: securelist.com - Author: Andrey Gunkin, Alexander Fedotov, Natalya Shornikova We continue covering the activities of...
securelist.com
Assessing the Y, and How, of the XZ Utils incident – Source: securelist.com
Source: securelist.com - Author: GReAT High-end APT groups perform highly interesting social engineering campaigns in order...
securelist.com
DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction In February 2024, we discovered a new malware campaign targeting...
securelist.com
SoumniBot: the new Android banker’s unique techniques – Source: securelist.com
Source: securelist.com - Author: Dmitry Kalinin The creators of widespread malware programs often employ various tools...
securelist.com
Using the LockBit builder to generate targeted ransomware – Source: securelist.com
Source: securelist.com - Author: Eduardo Ovalle, Francesco Figurelli, Cristian Souza, Ashley Muñoz The previous Kaspersky research...
securelist.com
XZ backdoor story – Initial analysis – Source: securelist.com
Source: securelist.com - Author: GReAT On March 29, 2024, a single message on the Openwall OSS-security...
securelist.com
An educational robot security research – Source: securelist.com
Source: securelist.com - Author: Nikolay Frolov In the modern world, we are surrounded by a multitude...
securelist.com
DinodasRAT Linux implant targeting entities worldwide – Source: securelist.com
Source: securelist.com - Author: Anderson Leite, Lisandro Ubiedo DinodasRAT, also known as XDealer, is a multi-platform...
securelist.com
Android malware, Android malware and more Android malware – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Malware for mobile devices is something we come across very...
securelist.com
Threat landscape for industrial automation systems. H2 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Industrial threats Industrial threats 19 Mar 2024 minute read...
securelist.com
A patched Windows attack surface is still exploitable – Source: securelist.com
Source: securelist.com - Author: Elsayed Elrefaei, Ashraf Refaat, Kaspersky GERT On August 8, 2023, Microsoft finally...
securelist.com
What’s in your notepad? Infected text editors target Chinese users – Source: securelist.com
Source: securelist.com - Author: Sergey Puzan “Malvertising” is a popular way of attracting victims to malicious...
securelist.com
The State of Stalkerware in 2023–2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky The State of Stalkerware in 2023 (PDF) The annual Kaspersky State...
securelist.com
Top 10 web application vulnerabilities in 2021–2023 – Source: securelist.com
Source: securelist.com - Author: Oxana Andreeva, Kaspersky Security Services To help companies with navigating the world...
securelist.com
Spam and phishing in 2023 – Source: securelist.com
Source: securelist.com - Author: Tatyana Kulikova, Olga Svistunova, Andrey Kovtun, Irina Shimko, Roman Dedenok The year...
securelist.com
Network tunneling with… QEMU? – Source: securelist.com
Source: securelist.com - Author: Grigory Sablin, Alexander Rodchenko, Kirill Magaskin Cyberattackers tend to give preference to...
securelist.com
An educational robot security research – Source: securelist.com
Source: securelist.com - Author: Nikolay Frolov In the modern world, we are surrounded by a multitude...
Posts navigation
1
2
3
Latest News
Data Breach Today
Meta and YouTube Update Their AI Content Policies – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Evolve Ransomware Hack Affects Affirm and Fintech Companies – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Rapid7 Purchases Noetic for Better Attack Surface Management – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
Securing Healthcare: Minimizing Risk in an Ever-Changing Threat Landscape – Source: www.databreachtoday.com
03/07/2024
Data Breach Today
How Top Cybersecurity Leaders Predict Threats and Navigate Risk – Source: www.databreachtoday.com
03/07/2024