Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
Andariel’s silly mistakes and a new malware family – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Andariel, a part of the notorious Lazarus group, is known...
securelist.com
How cybercrime is impacting SMBs in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky According to the United Nations, small and medium-sized businesses (SMBs) constitute 90...
securelist.com
LockBit Green and phishing that targets organizations – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction In recent months, we published private reports on a broad...
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Leonid Bezvershenko, Igor Kuznetsov Malware descriptions Malware descriptions 21 Jun...
securelist.com
A bowl full of security problems: Examining the vulnerabilities of smart pet feeders – Source: securelist.com
Source: securelist.com - Author: Roland Sako Introduction In today’s interconnected world, more and more devices are...
securelist.com
Understanding Malware-as-a-Service – Source: securelist.com
Source: securelist.com - Author: Kaspersky Security Services, Alexander Zabrovsky Money is the root of all evil,...
securelist.com
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency – Source: securelist.com
Source: securelist.com - Author: GReAT, Sergey Lozhkin Introduction Stealing cryptocurrencies is nothing new. For example, the...
securelist.com
IT threat evolution Q1 2023 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q1 2023 IT threat evolution in...
securelist.com
IT threat evolution Q1 2023. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution Q1 2023 IT threat evolution Q1 2023....
securelist.com
IT threat evolution in Q1 2023. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q1 2023 IT threat evolution in Q1...
securelist.com
Satacom delivers browser extension that steals cryptocurrency – Source: securelist.com
Source: securelist.com - Author: Haim Zigel, Oleg Kupreev Satacom downloader, also known as LegionLoader, is a...
securelist.com
In search of the Triangulation: triangle_check utility – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin Software Software 02 Jun...
securelist.com
Operation Triangulation: iOS devices targeted with previously unknown malware – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin APT reports APT reports...
securelist.com
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
Source: securelist.com - Author: Giampaolo Dedola GoldenJackal is an APT group, active since 2019, that usually...
securelist.com
CloudWizard APT: the bad magic story goes on – Source: securelist.com
Source: securelist.com - Author: Leonid Bezvershenko, Georgy Kucherin, Igor Kuznetsov In March 2023, we uncovered a...
securelist.com
Minas – on the way to complexity – Source: securelist.com
Source: securelist.com - Author: Ilya Borisov, Vasily Berdnikov Sometimes when investigating an infection and focusing on...
securelist.com
The nature of cyberincidents in 2022 – Source: securelist.com
Source: securelist.com - Author: Kaspersky GERT, Kaspersky Security Services SOC, TI and IR posts SOC, TI...
securelist.com
New ransomware trends in 2023 – Source: securelist.com
Source: securelist.com - Author: GReAT Ransomware keeps making headlines. In a quest for profits, attackers target...
securelist.com
Not quite an Easter egg: a new family of Trojan subscribers on Google Play – Source: securelist.com
Source: securelist.com - Author: Dmitry Kalinin Every once in a while, someone will come across malicious...
securelist.com
Managed Detection and Response in 2022 – Source: securelist.com
Source: securelist.com - Author: Kaspersky Security Services SOC, TI and IR posts SOC, TI and IR...
securelist.com
What does ChatGPT know about phishing? – Source: securelist.com
Source: securelist.com - Author: Vladislav Tushkanov Can ChatGPT detect phishing links? Hearing all the buzz about...
securelist.com
APT trends report Q1 2023 – Source: securelist.com
Source: securelist.com - Author: GReAT For more than five years, the Global Research and Analysis Team...
securelist.com
Tomiris called, they want their Turla malware back – Source: securelist.com
Source: securelist.com - Author: Pierre Delcher, Ivan Kwiatkowski Introduction We introduced Tomiris to the world in...
securelist.com
QBot banker delivered through business correspondence – Source: securelist.com
Source: securelist.com - Author: Victoria Vlasova, Andrey Kovtun, Darya Ivanova In early April, we detected a...
securelist.com
Uncommon infection methods—part 2 – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Although ransomware is still a hot topic on which we...
securelist.com
Following the Lazarus group by tracking DeathNote campaign – Source: securelist.com
Source: securelist.com - Author: Seongsu Park The Lazarus group is a high-profile Korean-speaking threat actor with...
securelist.com
Nokoyawa ransomware attacks with Windows zero-day – Source: securelist.com
Source: securelist.com - Author: Boris Larin Updated April 20, 2023 In February 2023, Kaspersky technologies detected...
Posts navigation
1
…
4
5
Latest News
securelist.com
Angry Likho: Old beasts in a new forest – Source: securelist.com
21/02/2025
CSO - Online
Managing the emotional toll cybersecurity incidents can take on your team – Source: www.csoonline.com
21/02/2025
CSO - Online
Security-Infotainment: Die besten Hacker-Dokus – Source: www.csoonline.com
21/02/2025
CSO - Online
Fake captcha attacks are increasing, say experts – Source: www.csoonline.com
21/02/2025
CSO - Online
CISOs wollen Cloud-Security vorantreiben – Source: www.csoonline.com
21/02/2025
CSO - Online
Mac users duped with FrigidStealer posing as browser updates – Source: www.csoonline.com
21/02/2025