Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
Grandoreiro, the global trojan with grandiose ambitions – Source: securelist.com
Source: securelist.com - Author: GReAT Grandoreiro is a well-known Brazilian banking trojan — part of the...
securelist.com
Stealer here, stealer there, stealers everywhere! – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Information stealers, which are used to collect credentials to then...
securelist.com
Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia – Source: securelist.com
Source: securelist.com - Author: Kaspersky Last December, we discovered a new group targeting Russian businesses and...
securelist.com
SAS CTF and the many ways to persist a kernel shellcode on Windows 7 – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Boris Larin SAS SAS 17 Oct 2024 minute read On...
securelist.com
Beyond the Surface: the evolution and expansion of the SideWinder APT group – Source: securelist.com
Source: securelist.com - Author: Giampaolo Dedola, Vasily Berdnikov SideWinder, aka T-APT-04 or RattleSnake, is one of...
securelist.com
Whispers from the Dark Web Cave. Cyberthreats in the Middle East – Source: securelist.com
Source: securelist.com - Author: Vera Kholopova, Kaspersky Security Services SOC, TI and IR posts SOC, TI...
securelist.com
Awaken Likho is awake: new techniques of an APT group – Source: securelist.com
Source: securelist.com - Author: Kaspersky Introduction In July 2021, a campaign was launched primarily targeting Russian...
securelist.com
Scam Information and Event Management – Source: securelist.com
Source: securelist.com - Author: Alexander Kryazhev, Denis Sitchikhin While trying to deliver malware on victims’ devices...
securelist.com
Finding a needle in a haystack: Machine learning at the forefront of threat hunting research – Source: securelist.com
Source: securelist.com - Author: Mohamad Amin Hasbini Introduction In the ever-evolving landscape of cybersecurity, logs, that...
securelist.com
Key Group: another ransomware group using leaked builders – Source: securelist.com
Source: securelist.com - Author: Kaspersky Key Group, or keygroup777, is a financially motivated ransomware group primarily...
securelist.com
Threat landscape for industrial automation systems, Q2 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Statistics across all threats In the second quarter of...
securelist.com
From 12 to 21: how we discovered connections between the Twelve and BlackJack groups – Source: securelist.com
Source: securelist.com - Author: Kaspersky While analyzing attacks on Russian organizations, our team regularly encounters overlapping...
securelist.com
Web tracking report: who monitored users’ online activities in 2023–2024 the most – Source: securelist.com
Source: securelist.com - Author: Anna Larkina, Flavio Negrini Web tracking has become a pervasive aspect of...
securelist.com
How the Necro Trojan infiltrated Google Play, again – Source: securelist.com
Source: securelist.com - Author: Dmitry Kalinin Introduction We sometimes come across modified applications when analyzing suspicious...
securelist.com
-=TWELVE=- is back – Source: securelist.com
Source: securelist.com - Author: Kaspersky In the spring of 2024, posts with real people’s personal data...
securelist.com
Exotic SambaSpy is now dancing with Italian users – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction In May 2024, we detected a campaign exclusively targeting victims...
securelist.com
Trusted relationship attacks: trust, but verify – Source: securelist.com
Source: securelist.com - Author: Dmitry Kachan, Alina Sukhanova IT outsourcing market continues to demonstrate strong growth...
securelist.com
Message board scams – Source: securelist.com
Source: securelist.com - Author: CFR team Marketplace fraud is nothing new. Cybercriminals swindle money out of...
securelist.com
Threat landscape for industrial automation systems, Q1 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Global statistics Statistics across all threats In the first...
securelist.com
ShrinkLocker: Turning BitLocker into ransomware – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Eduardo Ovalle, Ashley Muñoz, Christopher Zachor Introduction Attackers always find...
securelist.com
A journey into forgotten Null Session and MS-RPC interfaces – Source: securelist.com
Source: securelist.com - Author: Haidar Kabibo A journey into forgotten Null Session and MS-RPC interfaces (PDF)...
securelist.com
Stealers, stealers and more stealers – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Stealers are a prominent threat in the malware landscape. Over...
securelist.com
QakBot attacks with Windows zero-day (CVE-2024-30051) – Source: securelist.com
Source: securelist.com - Author: Boris Larin, Mert Degirmenci Software Software 14 May 2024 minute read In...
securelist.com
Incident response analyst report 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky GERT, Kaspersky Security Services SOC, TI and IR posts SOC, TI...
securelist.com
APT trends report Q1 2024 – Source: securelist.com
Source: securelist.com - Author: GReAT For more than six years, the Global Research and Analysis Team...
securelist.com
State of ransomware in 2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Ransomware attacks continue to be one of the biggest contemporary cybersecurity...
securelist.com
Exploits and vulnerabilities in Q1 2024 – Source: securelist.com
Source: securelist.com - Author: Alexander Kolesnikov, Vitaly Morgunov We at Kaspersky continuously monitor the evolving cyberthreat...
securelist.com
Financial cyberthreats in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Money is what always attracts cybercriminals. A significant share of scam,...
securelist.com
Managed Detection and Response in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Security Services Managed Detection and Response in 2023 (PDF) Alongside other...
securelist.com
ToddyCat is making holes in your infrastructure – Source: securelist.com
Source: securelist.com - Author: Andrey Gunkin, Alexander Fedotov, Natalya Shornikova We continue covering the activities of...
Posts navigation
1
2
3
…
5
Latest News
CSO - Online
So entgiften Sie Ihre Sicherheitskultur – Source: www.csoonline.com
19/12/2024
CSO - Online
Top security solutions being piloted today — and how to do it right – Source: www.csoonline.com
19/12/2024
CSO - Online
Die 10 häufigsten LLM-Schwachstellen – Source: www.csoonline.com
19/12/2024
CSO - Online
Sehr geehrter CEO, – Source: www.csoonline.com
19/12/2024
CSO - Online
European authorities say AI can use personal data without consent for training – Source: www.csoonline.com
19/12/2024
securelist.com
Attackers exploiting a patched FortiClient EMS vulnerability in the wild – Source: securelist.com
19/12/2024