Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securelist.com
securelist.com
Free Download Manager backdoored – a possible supply chain attack on Linux machines – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Leonid Bezvershenko Over the last few years, Linux machines have...
securelist.com
From Caribbean shores to your devices: analyzing Cuba ransomware – Source: securelist.com
Source: securelist.com - Author: Alexander Kirichenko, Gleb Ivanov Introduction Knowledge is our best weapon in the...
securelist.com
Evil Telegram doppelganger attacks Chinese users – Source: securelist.com
Source: securelist.com - Author: Igor Golovin A while ago we discovered a bunch of Telegram mods...
securelist.com
IT threat evolution in Q2 2023. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q2 2023 IT threat evolution in Q2...
securelist.com
IT threat evolution in Q2 2023. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution in Q2 2023 IT threat evolution in...
securelist.com
IT threat evolution in Q2 2023 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q2 2023 IT threat evolution in...
securelist.com
Lockbit leak, research opportunities on tools leaked from TAs – Source: securelist.com
Source: securelist.com - Author: Eduardo Ovalle, Francesco Figurelli Lockbit is one of the most prevalent ransomware...
securelist.com
Phishing with hacked sites – Source: securelist.com
Source: securelist.com - Author: Tatyana Machneva, Olga Svistunova Phishers want their fake pages to cost minimum...
securelist.com
Common TTPs of attacks against industrial organizations – Source: securelist.com
Source: securelist.com - Author: Kirill Kruglov, Vyacheslav Kopeytsev, Artem Snegirev In 2022 we investigated a series...
securelist.com
What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction The malware landscape keeps evolving. New families are born, while...
securelist.com
Anomaly detection in certificate-based TGT requests – Source: securelist.com
Source: securelist.com - Author: Alexander Rodchenko One of the most complex yet effective methods of gaining...
securelist.com
APT trends report Q2 2023 – Source: securelist.com
Source: securelist.com - Author: GReAT For more than six years, the Global Research and Analysis Team...
securelist.com
Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability – Source: securelist.com
Source: securelist.com - Author: Francesco Figurelli, Eduardo Ovalle On March 14, 2023, Microsoft published a blogpost...
securelist.com
Email crypto phishing scams: stealing from hot and cold crypto wallets – Source: securelist.com
Source: securelist.com - Author: Roman Dedenok, Konstantin Zykov The higher the global popularity of cryptocurrencies and...
securelist.com
Andariel’s silly mistakes and a new malware family – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction Andariel, a part of the notorious Lazarus group, is known...
securelist.com
How cybercrime is impacting SMBs in 2023 – Source: securelist.com
Source: securelist.com - Author: Kaspersky According to the United Nations, small and medium-sized businesses (SMBs) constitute 90...
securelist.com
LockBit Green and phishing that targets organizations – Source: securelist.com
Source: securelist.com - Author: GReAT Introduction In recent months, we published private reports on a broad...
securelist.com
Dissecting TriangleDB, a Triangulation spyware implant – Source: securelist.com
Source: securelist.com - Author: Georgy Kucherin, Leonid Bezvershenko, Igor Kuznetsov Malware descriptions Malware descriptions 21 Jun...
securelist.com
A bowl full of security problems: Examining the vulnerabilities of smart pet feeders – Source: securelist.com
Source: securelist.com - Author: Roland Sako Introduction In today’s interconnected world, more and more devices are...
securelist.com
Understanding Malware-as-a-Service – Source: securelist.com
Source: securelist.com - Author: Kaspersky Security Services, Alexander Zabrovsky Money is the root of all evil,...
securelist.com
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency – Source: securelist.com
Source: securelist.com - Author: GReAT, Sergey Lozhkin Introduction Stealing cryptocurrencies is nothing new. For example, the...
securelist.com
IT threat evolution Q1 2023 – Source: securelist.com
Source: securelist.com - Author: David Emm IT threat evolution in Q1 2023 IT threat evolution in...
securelist.com
IT threat evolution Q1 2023. Mobile statistics – Source: securelist.com
Source: securelist.com - Author: Anton Kivva IT threat evolution Q1 2023 IT threat evolution Q1 2023....
securelist.com
IT threat evolution in Q1 2023. Non-mobile statistics – Source: securelist.com
Source: securelist.com - Author: AMR IT threat evolution in Q1 2023 IT threat evolution in Q1...
securelist.com
Satacom delivers browser extension that steals cryptocurrency – Source: securelist.com
Source: securelist.com - Author: Haim Zigel, Oleg Kupreev Satacom downloader, also known as LegionLoader, is a...
securelist.com
In search of the Triangulation: triangle_check utility – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin Software Software 02 Jun...
securelist.com
Operation Triangulation: iOS devices targeted with previously unknown malware – Source: securelist.com
Source: securelist.com - Author: Igor Kuznetsov, Valentin Pashkov, Leonid Bezvershenko, Georgy Kucherin APT reports APT reports...
securelist.com
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
Source: securelist.com - Author: Giampaolo Dedola GoldenJackal is an APT group, active since 2019, that usually...
securelist.com
CloudWizard APT: the bad magic story goes on – Source: securelist.com
Source: securelist.com - Author: Leonid Bezvershenko, Georgy Kucherin, Igor Kuznetsov In March 2023, we uncovered a...
securelist.com
Minas – on the way to complexity – Source: securelist.com
Source: securelist.com - Author: Ilya Borisov, Vasily Berdnikov Sometimes when investigating an infection and focusing on...
Posts navigation
1
…
5
6
7
Latest News
The Hacker News
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads – Source:thehackernews.com
10/07/2025
The Hacker News
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord – Source:thehackernews.com
10/07/2025
The Hacker News
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods – Source:thehackernews.com
10/07/2025
The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS – Source:thehackernews.com
10/07/2025
The Hacker News
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App – Source:thehackernews.com
10/07/2025
The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs – Source:thehackernews.com
10/07/2025