Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
securelist.com
securelist.com
securelist.com
Android malware, Android malware and more Android malware – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Malware for mobile devices is something we come across very...
securelist.com
Threat landscape for industrial automation systems. H2 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Industrial threats Industrial threats 19 Mar 2024 minute read...
securelist.com
Top 10 web application vulnerabilities in 2021–2023 – Source: securelist.com
Source: securelist.com - Author: Oxana Andreeva, Kaspersky Security Services To help companies with navigating the world...
securelist.com
A patched Windows attack surface is still exploitable – Source: securelist.com
Source: securelist.com - Author: Elsayed Elrefaei, Ashraf Refaat, Kaspersky GERT On August 8, 2023, Microsoft finally...
securelist.com
What’s in your notepad? Infected text editors target Chinese users – Source: securelist.com
Source: securelist.com - Author: Sergey Puzan “Malvertising” is a popular way of attracting victims to malicious...
securelist.com
The State of Stalkerware in 2023–2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky The State of Stalkerware in 2023 (PDF) The annual Kaspersky State...
securelist.com
Spam and phishing in 2023 – Source: securelist.com
Source: securelist.com - Author: Tatyana Kulikova, Olga Svistunova, Andrey Kovtun, Irina Shimko, Roman Dedenok The year...
securelist.com
Network tunneling with… QEMU? – Source: securelist.com
Source: securelist.com - Author: Grigory Sablin, Alexander Rodchenko, Kirill Magaskin Cyberattackers tend to give preference to...
securelist.com
An educational robot security research – Source: securelist.com
Source: securelist.com - Author: Nikolay Frolov In the modern world, we are surrounded by a multitude...
securelist.com
The mobile malware threat landscape in 2023 – Source: securelist.com
Source: securelist.com - Author: Anton Kivva The figures above are based on detection statistics received from...
securelist.com
Coyote: A multi-stage banking Trojan abusing the Squirrel installer – Source: securelist.com
Source: securelist.com - Author: GReAT The developers of banking Trojan malware are constantly looking for inventive...
securelist.com
ICS and OT threat predictions for 2024 – Source: securelist.com
Source: securelist.com - Author: Evgeny Goncharov Kaspersky Security Bulletin We do not expect rapid changes in...
securelist.com
Privacy predictions for 2024 – Source: securelist.com
Source: securelist.com - Author: Anna Larkina, Vladislav Tushkanov, Dmitry Momotov Kaspersky Security Bulletin In our previous...
securelist.com
Cracked software beats gold: new macOS backdoor stealing cryptowallets – Source: securelist.com
Source: securelist.com - Author: Sergey Puzan A month ago, we discovered some cracked apps circulating on...
securelist.com
Dark web threats and dark market predictions for 2024 – Source: securelist.com
Source: securelist.com - Author: Sergey Lozhkin, Anna Pavlovskaya, Kaspersky Security Services Kaspersky Security Bulletin An overview...
securelist.com
A lightweight method to detect potential iOS malware – Source: securelist.com
Source: securelist.com - Author: Maher Yamout Introduction In the ever-evolving landscape of mobile security, hunting for...
securelist.com
Operation Triangulation: The last (hardware) mystery – Source: securelist.com
Source: securelist.com - Author: Boris Larin Research Research 27 Dec 2023 minute read Today, on December...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376) – Source: securelist.com
Source: securelist.com - Author: Boris Larin This is part five of our study about the Common...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) – Source: securelist.com
Source: securelist.com - Author: Boris Larin Reports In this report Kaspersky researchers provide an analysis of...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022) – Source: securelist.com
Source: securelist.com - Author: Boris Larin Research Research 21 Dec 2023 minute read This is the...
securelist.com
Windows CLFS and five exploits used by ransomware operators – Source: securelist.com
Source: securelist.com - Author: Boris Larin In April 2023, we published a blog post about a...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521) – Source: securelist.com
Source: securelist.com - Author: Boris Larin This is the second part of our study about the...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252) – Source: securelist.com
Source: securelist.com - Author: Boris Larin This is part six of our study about the Common...
securelist.com
A cryptor, a stealer and a banking trojan – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction As long as cybercriminals want to make money, they’ll keep...
securelist.com
QR codes in email phishing – Source: securelist.com
Source: securelist.com - Author: Roman Dedenok QR codes are everywhere: you can see them on posters...
securelist.com
Overview of IoT threats in 2023 – Source: securelist.com
Source: securelist.com - Author: Vitaly Morgunov, Yaroslav Shmelev, Kaspersky Security Services, Kaspersky ICS CERT IoT devices...
securelist.com
Threat landscape for industrial automation systems. Statistics for H1 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Global threat statistics In the first half of 2023,...
securelist.com
Free Download Manager backdoored – a possible supply chain attack on Linux machines – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Leonid Bezvershenko Over the last few years, Linux machines have...
securelist.com
From Caribbean shores to your devices: analyzing Cuba ransomware – Source: securelist.com
Source: securelist.com - Author: Alexander Kirichenko, Gleb Ivanov Introduction Knowledge is our best weapon in the...
securelist.com
Evil Telegram doppelganger attacks Chinese users – Source: securelist.com
Source: securelist.com - Author: Igor Golovin A while ago we discovered a bunch of Telegram mods...
Posts navigation
1
2
3
Latest News
Data Breach Today
The AI Revolution and White-Collar Workers – Source: www.databreachtoday.com
26/03/2024
Data Breach Today
Hospitals Lobby Feds to Clarify Breach Duties in UHG Attack – Source: www.databreachtoday.com
26/03/2024
Data Breach Today
Webinar | The Cost of Convenience: Exploring the Risks of Password Reuse – Source: www.databreachtoday.com
26/03/2024
Data Breach Today
UK Discloses Chinese Espionage Activities – Source: www.databreachtoday.com
26/03/2024
Data Breach Today
Report Urges Congress to Form an Armed Cyber Military Branch – Source: www.databreachtoday.com
26/03/2024
The Hacker News
Russian Hackers Use ‘WINELOADER’ Malware to Target German Political Parties – Source:thehackernews.com
25/03/2024