Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
securelist.com
Page 2
securelist.com
securelist.com
Overview of IoT threats in 2023 – Source: securelist.com
Source: securelist.com - Author: Vitaly Morgunov, Yaroslav Shmelev, Kaspersky Security Services, Kaspersky ICS CERT IoT devices...
securelist.com
Threat landscape for industrial automation systems. Statistics for H1 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Global threat statistics In the first half of 2023,...
securelist.com
Free Download Manager backdoored – a possible supply chain attack on Linux machines – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Leonid Bezvershenko Over the last few years, Linux machines have...
securelist.com
From Caribbean shores to your devices: analyzing Cuba ransomware – Source: securelist.com
Source: securelist.com - Author: Alexander Kirichenko, Gleb Ivanov Introduction Knowledge is our best weapon in the...
securelist.com
Evil Telegram doppelganger attacks Chinese users – Source: securelist.com
Source: securelist.com - Author: Igor Golovin A while ago we discovered a bunch of Telegram mods...
securelist.com
IT threat evolution in Q2 2023. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q2 2023 IT threat evolution in Q2...
securelist.com
IT threat evolution in Q2 2023. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution in Q2 2023 IT threat evolution in...
securelist.com
IT threat evolution in Q2 2023 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q2 2023 IT threat evolution in...
securelist.com
Lockbit leak, research opportunities on tools leaked from TAs – Source: securelist.com
Source: securelist.com - Author: Eduardo Ovalle, Francesco Figurelli Lockbit is one of the most prevalent ransomware...
securelist.com
Phishing with hacked sites – Source: securelist.com
Source: securelist.com - Author: Tatyana Machneva, Olga Svistunova Phishers want their fake pages to cost minimum...
securelist.com
Focus on DroxiDat/SystemBC – Source: securelist.com
Source: securelist.com - Author: Kurt Baumgartner Recently we pushed a report to our customers about an...
securelist.com
Common TTPs of attacks against industrial organizations – Source: securelist.com
Source: securelist.com - Author: Kirill Kruglov, Vyacheslav Kopeytsev, Artem Snegirev In 2022 we investigated a series...
securelist.com
What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction The malware landscape keeps evolving. New families are born, while...
securelist.com
Anomaly detection in certificate-based TGT requests – Source: securelist.com
Source: securelist.com - Author: Alexander Rodchenko One of the most complex yet effective methods of gaining...
securelist.com
APT trends report Q2 2023 – Source: securelist.com
Source: securelist.com - Author: GReAT For more than six years, the Global Research and Analysis Team...
securelist.com
Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability – Source: securelist.com
Source: securelist.com - Author: Francesco Figurelli, Eduardo Ovalle On March 14, 2023, Microsoft published a blogpost...
securelist.com
Email crypto phishing scams: stealing from hot and cold crypto wallets – Source: securelist.com
Source: securelist.com - Author: Roman Dedenok, Konstantin Zykov The higher the global popularity of cryptocurrencies and...
securelist.com
Andariel’s silly mistakes and a new malware family – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Andariel, a part of the notorious Lazarus group, is known...
securelist.com
How cybercrime is impacting SMBs in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky According to the United Nations, small and medium-sized businesses (SMBs) constitute 90...
securelist.com
LockBit Green and phishing that targets organizations – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction In recent months, we published private reports on a broad...
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Leonid Bezvershenko, Igor Kuznetsov Malware descriptions Malware descriptions 21 Jun...
securelist.com
A bowl full of security problems: Examining the vulnerabilities of smart pet feeders – Source: securelist.com
Source: securelist.com - Author: Roland Sako Introduction In today’s interconnected world, more and more devices are...
securelist.com
Understanding Malware-as-a-Service – Source: securelist.com
Source: securelist.com - Author: Kaspersky Security Services, Alexander Zabrovsky Money is the root of all evil,...
securelist.com
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency – Source: securelist.com
Source: securelist.com - Author: GReAT, Sergey Lozhkin Introduction Stealing cryptocurrencies is nothing new. For example, the...
securelist.com
IT threat evolution Q1 2023 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q1 2023 IT threat evolution in...
securelist.com
IT threat evolution Q1 2023. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution Q1 2023 IT threat evolution Q1 2023....
securelist.com
IT threat evolution in Q1 2023. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q1 2023 IT threat evolution in Q1...
securelist.com
Satacom delivers browser extension that steals cryptocurrency – Source: securelist.com
Source: securelist.com - Author: Haim Zigel, Oleg Kupreev Satacom downloader, also known as LegionLoader, is a...
securelist.com
In search of the Triangulation: triangle_check utility – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin Software Software 02 Jun...
securelist.com
Operation Triangulation: iOS devices targeted with previously unknown malware – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin APT reports APT reports...
Posts navigation
1
2
3
Latest News
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | Human Detection & Response: Exploring Three Security Awareness Realities – Source: www.databreachtoday.com
19/04/2024