Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
Scammer Black Friday offers: Online shopping threats and dark web sales – Source: securelist.com
Source: securelist.com - Author: Kaspersky Intro The e-commerce market continues to grow every year. According to...
securelist.com
Сrimeware and financial cyberthreats in 2025 – Source: securelist.com
Source: securelist.com - Author: GReAT Kaspersky Security Bulletin Kaspersky’s Global Research and Analysis Team constantly monitors...
securelist.com
Threats in space (or rather, on Earth): internet-exposed GNSS receivers – Source: securelist.com
Source: securelist.com - Author: Isabel Manjarrez What is GNSS? Global Navigation Satellite Systems (GNSS) are collections,...
securelist.com
Ymir: new stealthy ransomware in the wild – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Ashley Muñoz, Eduardo Ovalle Introduction In a recent incident response...
securelist.com
QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns – Source: securelist.com
Source: securelist.com - Author: Saurabh Sharma Introduction In 2021, we began to investigate an attack on...
securelist.com
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency – Source: securelist.com
Source: securelist.com - Author: Kirill Korchemny Introduction In August 2024, our team identified a new crimeware...
securelist.com
Loose-lipped neural networks and lazy scammers – Source: securelist.com
Source: securelist.com - Author: Vladislav Tushkanov One topic being actively researched in connection with the breakout...
securelist.com
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses – Source: securelist.com
Source: securelist.com - Author: Victor Sergeev, Amged Wageh, Ahmed Khlief Introduction Organizations often rely on a...
securelist.com
Lumma/Amadey: fake CAPTCHAs want to know if you’re human – Source: securelist.com
Source: securelist.com - Author: Vasily Kolesnikov Attackers are increasingly distributing malware through a rather unusual method:...
securelist.com
The Crypto Game of Lazarus APT: Investors vs. Zero-days – Source: securelist.com
Source: securelist.com - Author: Boris Larin, Vasily Berdnikov Introduction Lazarus APT and its BlueNoroff subgroup are...
securelist.com
Grandoreiro, the global trojan with grandiose goals – Source: securelist.com
Source: securelist.com - Author: GReAT Grandoreiro is a well-known Brazilian banking trojan — part of the...
securelist.com
Grandoreiro, the global trojan with grandiose ambitions – Source: securelist.com
Source: securelist.com - Author: GReAT Grandoreiro is a well-known Brazilian banking trojan — part of the...
securelist.com
Stealer here, stealer there, stealers everywhere! – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Information stealers, which are used to collect credentials to then...
securelist.com
Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia – Source: securelist.com
Source: securelist.com - Author: Kaspersky Last December, we discovered a new group targeting Russian businesses and...
securelist.com
SAS CTF and the many ways to persist a kernel shellcode on Windows 7 – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Boris Larin SAS SAS 17 Oct 2024 minute read On...
securelist.com
Beyond the Surface: the evolution and expansion of the SideWinder APT group – Source: securelist.com
Source: securelist.com - Author: Giampaolo Dedola, Vasily Berdnikov SideWinder, aka T-APT-04 or RattleSnake, is one of...
securelist.com
Whispers from the Dark Web Cave. Cyberthreats in the Middle East – Source: securelist.com
Source: securelist.com - Author: Vera Kholopova, Kaspersky Security Services SOC, TI and IR posts SOC, TI...
securelist.com
Awaken Likho is awake: new techniques of an APT group – Source: securelist.com
Source: securelist.com - Author: Kaspersky Introduction In July 2021, a campaign was launched primarily targeting Russian...
securelist.com
Scam Information and Event Management – Source: securelist.com
Source: securelist.com - Author: Alexander Kryazhev, Denis Sitchikhin While trying to deliver malware on victims’ devices...
securelist.com
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research – Source: securelist.com
Source: securelist.com - Author: Mohamad Amin Hasbini Introduction In the ever-evolving landscape of cybersecurity, logs, that...
securelist.com
Key Group: another ransomware group using leaked builders – Source: securelist.com
Source: securelist.com - Author: Kaspersky Key Group, or keygroup777, is a financially motivated ransomware group primarily...
securelist.com
Threat landscape for industrial automation systems, Q2 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Statistics across all threats In the second quarter of...
securelist.com
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups – Source: securelist.com
Source: securelist.com - Author: Kaspersky While analyzing attacks on Russian organizations, our team regularly encounters overlapping...
securelist.com
Web tracking report: who monitored users’ online activities in 2023–2024 the most – Source: securelist.com
Source: securelist.com - Author: Anna Larkina, Flavio Negrini Web tracking has become a pervasive aspect of...
securelist.com
How the Necro Trojan infiltrated Google Play, again – Source: securelist.com
Source: securelist.com - Author: Dmitry Kalinin Introduction We sometimes come across modified applications when analyzing suspicious...
securelist.com
-=TWELVE=- is back – Source: securelist.com
Source: securelist.com - Author: Kaspersky In the spring of 2024, posts with real people’s personal data...
securelist.com
Exotic SambaSpy is now dancing with Italian users – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction In May 2024, we detected a campaign exclusively targeting victims...
securelist.com
Trusted relationship attacks: trust, but verify – Source: securelist.com
Source: securelist.com - Author: Dmitry Kachan, Alina Sukhanova IT outsourcing market continues to demonstrate strong growth...
securelist.com
Message board scams – Source: securelist.com
Source: securelist.com - Author: CFR team Marketplace fraud is nothing new. Cybercriminals swindle money out of...
securelist.com
Threat landscape for industrial automation systems, Q1 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Global statistics Statistics across all threats In the first...
Posts navigation
1
2
…
4
Latest News
Data Breach Today
Nightwing CEO on Post-Raytheon Independence, Cyber Expertise – Source: www.databreachtoday.com
21/11/2024
Data Breach Today
AI-nt Nothing Gonna Break My Defense: Securing Against Automated Attacks – Source: www.databreachtoday.com
21/11/2024
Data Breach Today
Live Webinar | How to Build Cyber Resilience with Proactive Incident Response Strategies – Source: www.databreachtoday.com
21/11/2024
Data Breach Today
Navigating the Unstructured Data Maze: Your Journey Starts Here – Source: www.databreachtoday.com
21/11/2024
Data Breach Today
Let’s Give Thanks for How Far We’ve Come – and Forge Ahead! – Source: www.databreachtoday.com
21/11/2024
govinfosecurity.com
N-able Strengthens Cybersecurity via $266M Adlumin Purchase – Source: www.govinfosecurity.com
21/11/2024