Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
Using the LockBit builder to generate targeted ransomware – Source: securelist.com
Source: securelist.com - Author: Eduardo Ovalle, Francesco Figurelli, Cristian Souza, Ashley Muñoz The previous Kaspersky research...
securelist.com
XZ backdoor story – Initial analysis – Source: securelist.com
Source: securelist.com - Author: GReAT On March 29, 2024, a single message on the Openwall OSS-security...
securelist.com
An educational robot security research – Source: securelist.com
Source: securelist.com - Author: Nikolay Frolov In the modern world, we are surrounded by a multitude...
securelist.com
DinodasRAT Linux implant targeting entities worldwide – Source: securelist.com
Source: securelist.com - Author: Anderson Leite, Lisandro Ubiedo DinodasRAT, also known as XDealer, is a multi-platform...
securelist.com
Android malware, Android malware and more Android malware – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Malware for mobile devices is something we come across very...
securelist.com
Threat landscape for industrial automation systems. H2 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Industrial threats Industrial threats 19 Mar 2024 minute read...
securelist.com
A patched Windows attack surface is still exploitable – Source: securelist.com
Source: securelist.com - Author: Elsayed Elrefaei, Ashraf Refaat, Kaspersky GERT On August 8, 2023, Microsoft finally...
securelist.com
What’s in your notepad? Infected text editors target Chinese users – Source: securelist.com
Source: securelist.com - Author: Sergey Puzan “Malvertising” is a popular way of attracting victims to malicious...
securelist.com
The State of Stalkerware in 2023–2024 – Source: securelist.com
Source: securelist.com - Author: Kaspersky The State of Stalkerware in 2023 (PDF) The annual Kaspersky State...
securelist.com
Top 10 web application vulnerabilities in 2021–2023 – Source: securelist.com
Source: securelist.com - Author: Oxana Andreeva, Kaspersky Security Services To help companies with navigating the world...
securelist.com
Spam and phishing in 2023 – Source: securelist.com
Source: securelist.com - Author: Tatyana Kulikova, Olga Svistunova, Andrey Kovtun, Irina Shimko, Roman Dedenok The year...
securelist.com
Network tunneling with… QEMU? – Source: securelist.com
Source: securelist.com - Author: Grigory Sablin, Alexander Rodchenko, Kirill Magaskin Cyberattackers tend to give preference to...
securelist.com
An educational robot security research – Source: securelist.com
Source: securelist.com - Author: Nikolay Frolov In the modern world, we are surrounded by a multitude...
securelist.com
Coyote: A multi-stage banking Trojan abusing the Squirrel installer – Source: securelist.com
Source: securelist.com - Author: GReAT The developers of banking Trojan malware are constantly looking for inventive...
securelist.com
ICS and OT threat predictions for 2024 – Source: securelist.com
Source: securelist.com - Author: Evgeny Goncharov Kaspersky Security Bulletin We do not expect rapid changes in...
securelist.com
Privacy predictions for 2024 – Source: securelist.com
Source: securelist.com - Author: Anna Larkina, Vladislav Tushkanov, Dmitry Momotov Kaspersky Security Bulletin In our previous...
securelist.com
Cracked software beats gold: new macOS backdoor stealing cryptowallets – Source: securelist.com
Source: securelist.com - Author: Sergey Puzan A month ago, we discovered some cracked apps circulating on...
securelist.com
Dark web threats and dark market predictions for 2024 – Source: securelist.com
Source: securelist.com - Author: Sergey Lozhkin, Anna Pavlovskaya, Kaspersky Security Services Kaspersky Security Bulletin An overview...
securelist.com
A lightweight method to detect potential iOS malware – Source: securelist.com
Source: securelist.com - Author: Maher Yamout Introduction In the ever-evolving landscape of mobile security, hunting for...
securelist.com
Operation Triangulation: The last (hardware) mystery – Source: securelist.com
Source: securelist.com - Author: Boris Larin Research Research 27 Dec 2023 minute read Today, on December...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376) – Source: securelist.com
Source: securelist.com - Author: Boris Larin This is part five of our study about the Common...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) – Source: securelist.com
Source: securelist.com - Author: Boris Larin Reports In this report Kaspersky researchers provide an analysis of...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022) – Source: securelist.com
Source: securelist.com - Author: Boris Larin Research Research 21 Dec 2023 minute read This is the...
securelist.com
Windows CLFS and five exploits used by ransomware operators – Source: securelist.com
Source: securelist.com - Author: Boris Larin In April 2023, we published a blog post about a...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521) – Source: securelist.com
Source: securelist.com - Author: Boris Larin This is the second part of our study about the...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252) – Source: securelist.com
Source: securelist.com - Author: Boris Larin This is part six of our study about the Common...
securelist.com
A cryptor, a stealer and a banking trojan – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction As long as cybercriminals want to make money, they’ll keep...
securelist.com
QR codes in email phishing – Source: securelist.com
Source: securelist.com - Author: Roman Dedenok QR codes are everywhere: you can see them on posters...
securelist.com
Overview of IoT threats in 2023 – Source: securelist.com
Source: securelist.com - Author: Vitaly Morgunov, Yaroslav Shmelev, Kaspersky Security Services, Kaspersky ICS CERT IoT devices...
securelist.com
Threat landscape for industrial automation systems. Statistics for H1 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky ICS CERT Global threat statistics In the first half of 2023,...
Posts navigation
1
…
4
5
6
7
Latest News
Krebs On Security
UK Arrests Four in ‘Scattered Spider’ Ransom Group – Source: krebsonsecurity.com
11/07/2025
securityweek.com
AirMDR Raises $15.5 Million for MDR Solution – Source: www.securityweek.com
10/07/2025
The Hacker News
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads – Source:thehackernews.com
10/07/2025
The Hacker News
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord – Source:thehackernews.com
10/07/2025
The Hacker News
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods – Source:thehackernews.com
10/07/2025
The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS – Source:thehackernews.com
10/07/2025