Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations – Source: securelist.com
Source: securelist.com - Author: Kaspersky About C.A.S C.A.S (Cyber Anarchy Squad) is a hacktivist group that...
securelist.com
Download a banker to track your parcel – Source: securelist.com
Source: securelist.com - Author: Dmitry Kalinin In late October 2024, a new scheme for distributing a...
securelist.com
Dark web threats and dark market predictions for 2025 – Source: securelist.com
Source: securelist.com - Author: Alexander Zabrovsky, Sergey Lozhkin Review of last year’s predictions The number of...
securelist.com
Careto is back: what’s new after 10 years of silence? – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Marc Rivero During the first week of October, Kaspersky took...
securelist.com
Story of the Year: global IT outages and supply chain attacks – Source: securelist.com
Source: securelist.com - Author: Alexander Liskin, Vladimir Kuskov, Igor Kuznetsov, Vitaly Kamluk A faulty update by...
securelist.com
Exploits and vulnerabilities in Q3 2024 – Source: securelist.com
Source: securelist.com - Author: Alexander Kolesnikov Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux...
securelist.com
Our secret ingredient for reverse engineering – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin Nowadays, a lot of cybersecurity professionals use IDA Pro as...
securelist.com
Kaspersky Security Bulletin 2024. Statistics – Source: securelist.com
Source: securelist.com - Author: AMR Kaspersky Security Bulletin All statistics in this report come from Kaspersky...
securelist.com
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT – Source: securelist.com
Source: securelist.com - Author: Artem Ushkov Recent months have seen a surge in mailings with lookalike...
securelist.com
IT threat evolution in Q3 2024. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q3 2024 IT threat evolution in Q3...
securelist.com
IT threat evolution in Q3 2024. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution in Q3 2024 IT threat evolution in...
securelist.com
IT threat evolution Q3 2024 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q3 2024 IT threat evolution in...
securelist.com
APT trends report Q3 2024 – Source: securelist.com
Source: securelist.com - Author: GReAT Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly...
securelist.com
Consumer and privacy predictions for 2025 – Source: securelist.com
Source: securelist.com - Author: Anna Larkina, Vladislav Tushkanov, Roman Dedenok, Dmitry Anikin, Dmitry Momotov Overview of...
securelist.com
Analysis of Elpaco: a Mimic variant – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Timofey Ezhov, Eduardo Ovalle, Ashley Muñoz Introduction In a recent...
securelist.com
Advanced threat predictions for 2025 – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Giampaolo Dedola, Georgy Kucherin, Maher Yamout, Vasily Berdnikov, Isabel Manjarrez,...
securelist.com
Scammer Black Friday offers: Online shopping threats and dark web sales – Source: securelist.com
Source: securelist.com - Author: Kaspersky Intro The e-commerce market continues to grow every year. According to...
securelist.com
Сrimeware and financial cyberthreats in 2025 – Source: securelist.com
Source: securelist.com - Author: GReAT Kaspersky Security Bulletin Kaspersky’s Global Research and Analysis Team constantly monitors...
securelist.com
Threats in space (or rather, on Earth): internet-exposed GNSS receivers – Source: securelist.com
Source: securelist.com - Author: Isabel Manjarrez What is GNSS? Global Navigation Satellite Systems (GNSS) are collections,...
securelist.com
Ymir: new stealthy ransomware in the wild – Source: securelist.com
Source: securelist.com - Author: Cristian Souza, Ashley Muñoz, Eduardo Ovalle Introduction In a recent incident response...
securelist.com
QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns – Source: securelist.com
Source: securelist.com - Author: Saurabh Sharma Introduction In 2021, we began to investigate an attack on...
securelist.com
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency – Source: securelist.com
Source: securelist.com - Author: Kirill Korchemny Introduction In August 2024, our team identified a new crimeware...
securelist.com
Loose-lipped neural networks and lazy scammers – Source: securelist.com
Source: securelist.com - Author: Vladislav Tushkanov One topic being actively researched in connection with the breakout...
securelist.com
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses – Source: securelist.com
Source: securelist.com - Author: Victor Sergeev, Amged Wageh, Ahmed Khlief Introduction Organizations often rely on a...
securelist.com
Lumma/Amadey: fake CAPTCHAs want to know if you’re human – Source: securelist.com
Source: securelist.com - Author: Vasily Kolesnikov Attackers are increasingly distributing malware through a rather unusual method:...
securelist.com
The Crypto Game of Lazarus APT: Investors vs. Zero-days – Source: securelist.com
Source: securelist.com - Author: Boris Larin, Vasily Berdnikov Introduction Lazarus APT and its BlueNoroff subgroup are...
securelist.com
Grandoreiro, the global trojan with grandiose goals – Source: securelist.com
Source: securelist.com - Author: GReAT Grandoreiro is a well-known Brazilian banking trojan — part of the...
securelist.com
Grandoreiro, the global trojan with grandiose ambitions – Source: securelist.com
Source: securelist.com - Author: GReAT Grandoreiro is a well-known Brazilian banking trojan — part of the...
securelist.com
Stealer here, stealer there, stealers everywhere! – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Information stealers, which are used to collect credentials to then...
securelist.com
Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia – Source: securelist.com
Source: securelist.com - Author: Kaspersky Last December, we discovered a new group targeting Russian businesses and...
Posts navigation
1
2
3
…
6
Latest News
securityweek.com
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware – Source: www.securityweek.com
29/03/2025
securityweek.com
9-Year-Old NPM Crypto Package Hijacked for Information Theft – Source: www.securityweek.com
29/03/2025
securityweek.com
In Other News: Hellcat Hackers Unmasked, CrushFTP Bug Controversy, NYU Hacked – Source: www.securityweek.com
29/03/2025
securityweek.com
New Issuance Requirements Improve HTTPS Certificate Validation – Source: www.securityweek.com
29/03/2025
securityweek.com
Morphing Meerkat Phishing Kits Target Over 100 Brands – Source: www.securityweek.com
29/03/2025
securityweek.com
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe – Source: www.securityweek.com
29/03/2025