Securelist

最新

1. Scammer Black Friday offers: Online shopping threats and dark web sales Publications ‧ Kaspersky
2. Сrimeware and financial cyberthreats in 2025 Kaspersky Security Bulletin ‧ GReAT
3. Threats in space (or rather, on Earth): internet-exposed GNSS receivers Research ‧ Isabel Manjarrez
4. Ymir: new stealthy ransomware in the wild Malware descriptions ‧ Cristian Souza, Ashley Muñoz, Eduardo Ovalle
5. QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns Malware descriptions ‧ Saurabh Sharma
6. New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency Malware descriptions ‧ Kirill Korchemny
7. Loose-lipped neural networks and lazy scammers Research ‧ Vladislav Tushkanov
8. Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses SOC, TI and IR posts ‧ Victor Sergeev, Amged Wageh, Ahmed Khlief
9. Lumma/Amadey: fake CAPTCHAs want to know if you’re human Malware descriptions ‧ Vasily Kolesnikov
10. The Crypto Game of Lazarus APT: Investors vs. Zero-days SAS ‧ Boris Larin, Vasily Berdnikov
更新于 39 分钟前

近期历史最近 100 条记录

2024-11-19 Scammer Black Friday offers: Online shopping threats and dark web sales Publications ‧ Kaspersky
2024-11-14 Сrimeware and financial cyberthreats in 2025 Kaspersky Security Bulletin ‧ GReAT
2024-11-13 Threats in space (or rather, on Earth): internet-exposed GNSS receivers Research ‧ Isabel Manjarrez
2024-11-11 Ymir: new stealthy ransomware in the wild Malware descriptions ‧ Cristian Souza, Ashley Muñoz, Eduardo Ovalle
2024-11-08 QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns Malware descriptions ‧ Saurabh Sharma
2024-11-06 New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency Malware descriptions ‧ Kirill Korchemny
2024-10-31 Loose-lipped neural networks and lazy scammers Research ‧ Vladislav Tushkanov
2024-10-29 Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses SOC, TI and IR posts ‧ Victor Sergeev, Amged Wageh, Ahmed Khlief
2024-10-29 Lumma/Amadey: fake CAPTCHAs want to know if you’re human Malware descriptions ‧ Vasily Kolesnikov
2024-10-23 The Crypto Game of Lazarus APT: Investors vs. Zero-days SAS ‧ Boris Larin, Vasily Berdnikov
2024-10-23 Grandoreiro, the global trojan with grandiose goals Malware descriptions ‧ GReAT
2024-10-21 Stealer here, stealer there, stealers everywhere! Crimeware reports ‧ GReAT
2024-10-18 Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia Crimeware reports ‧ Kaspersky
2024-10-17 SAS CTF and the many ways to persist a kernel shellcode on Windows 7 SAS ‧ Igor Kuznetsov, Boris Larin
2024-10-15 Beyond the Surface: the evolution and expansion of the SideWinder APT group APT reports ‧ Giampaolo Dedola, Vasily Berdnikov
2024-10-14 Whispers from the Dark Web Cave. Cyberthreats in the Middle East SOC, TI and IR posts ‧ Vera Kholopova, Kaspersky Security Services
2024-10-07 Awaken Likho is awake: new techniques of an APT group Crimeware reports ‧ Kaspersky
2024-10-04 Scam Information and Event Management Malware descriptions ‧ Alexander Kryazhev, Denis Sitchikhin
2024-10-02 Finding a needle in a haystack: Machine learning at the forefront of threat hunting research Publications ‧ Mohamad Amin Hasbini
2024-10-01 Key Group: another ransomware group using leaked builders Crimeware reports ‧ Kaspersky
2024-09-26 Threat landscape for industrial automation systems, Q2 2024 Industrial threats ‧ Kaspersky ICS CERT
2024-09-25 From 12 to 21: how we discovered connections between the Twelve and BlackJack groups Crimeware reports ‧ Kaspersky
2024-09-24 Web tracking report: who monitored users’ online activities in 2023–2024 the most Research ‧ Anna Larkina, Flavio Negrini
2024-09-23 How the Necro Trojan infiltrated Google Play, again Malware descriptions ‧ Dmitry Kalinin
2024-09-20 -=TWELVE=- is back Crimeware reports ‧ Kaspersky
2024-09-18 Exotic SambaSpy is now dancing with Italian users Crimeware reports ‧ GReAT
2024-09-09 Loki: a new private agent for the popular Mythic framework Malware descriptions ‧ Artem Ushkov
2024-09-05 Tropic Trooper spies on government entities in the Middle East Malware descriptions ‧ Sherif Magdy
2024-09-04 Mallox ransomware: in-depth analysis and evolution Crimeware reports ‧ Fedor Sinitsyn, Yanis Zinchenko
2024-09-03 A deep dive into the most interesting incident response cases of last year SOC, TI and IR posts ‧ Eduardo Ovalle, Ahmad Zaidi Said, AbdulRhman Alfaifi
2024-09-03 IT threat evolution in Q2 2024. Non-mobile statistics Malware reports ‧ AMR
2024-09-03 IT threat evolution in Q2 2024. Mobile statistics Malware reports ‧ Anton Kivva
2024-09-03 IT threat evolution Q2 2024 Malware reports ‧ David Emm
2024-09-02 Head Mare: adventures of a unicorn in Russia and Belarus Crimeware reports ‧ Kaspersky
2024-08-27 HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat Malware descriptions ‧ Sergey Puzan
2024-08-22 Memory corruption vulnerabilities in Suricata and FreeRDP Vulnerability reports ‧ Dmitry Shmoylov, Evgeny Legerov, Denis Skvortsov
2024-08-21 Exploits and vulnerabilities in Q2 2024 Vulnerability reports ‧ Vitaly Morgunov, Alexander Kolesnikov
2024-08-20 Approach to mainframe penetration testing on z/OS SOC, TI and IR posts ‧ Denis Stepanov, Alexander Korotin
2024-08-19 BlindEagle flying high in Latin America APT reports ‧ GReAT
2024-08-16 Tusk: unraveling a complex infostealer campaign SOC, TI and IR posts ‧ Elsayed Elrefaei, AbdulRhman Alfaifi
2024-08-14 EastWind campaign: new CloudSorcerer attacks on government organizations in Russia APT reports ‧ GReAT
2024-08-13 APT trends report Q2 2024 APT reports ‧ GReAT
2024-08-12 Indirect prompt injection in the real world: how people manipulate neural networks Research ‧ Vladislav Tushkanov
2024-08-05 LianSpy: new Android spyware targeting Russian users Malware descriptions ‧ Dmitry Kalinin
2024-08-01 How “professional” ransomware variants boost cybercrime groups Crimeware reports ‧ GReAT
2024-07-29 Mandrake spyware sneaks onto Google Play again, flying under the radar for two years Malware descriptions ‧ Tatyana Shishkova, Igor Golovin
2024-07-11 When spear phishing met mass phishing Spam and phishing ‧ Roman Dedenok
2024-07-09 Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK SOC, TI and IR posts ‧ Roman Nazarov, Andrey Tamoykin, Kaspersky Security Services
2024-07-08 CloudSorcerer – A new APT targeting Russian government entities APT reports ‧ GReAT
2024-07-02 Analysis of user password strength Research ‧ Alexey Antonov
2024-06-25 Cybersecurity in the SMB space — a growing threat Research ‧ Kaspersky
2024-06-24 XZ backdoor: Hook analysis Incidents ‧ Anderson Leite, Sergey Belov
2024-06-18 Analysis of user password strength Research ‧ Alexey Antonov
2024-06-13 Cinterion EHS5 3G UMTS/HSPA Module Research Research ‧ Kaspersky ICS CERT
2024-06-11 QR code SQL injection and other vulnerabilities in a popular biometric terminal Research ‧ Georgy Kiguradze
2024-06-10 Bypassing 2FA with phishing and OTP bots Spam and phishing ‧ Olga Svistunova
2024-06-03 IT threat evolution in Q1 2024. Mobile statistics Malware reports ‧ Anton Kivva
2024-06-03 IT threat evolution Q1 2024 Malware reports ‧ David Emm
2024-06-03 IT threat evolution in Q1 2024. Non-mobile statistics Malware reports ‧ AMR
2024-05-28 Trusted relationship attacks: trust, but verify SOC, TI and IR posts ‧ Dmitry Kachan, Alina Sukhanova
2024-05-27 Message board scams Spam and phishing ‧ CFR team
2024-05-27 Threat landscape for industrial automation systems, Q1 2024 Industrial threats ‧ Kaspersky ICS CERT
2024-05-23 ShrinkLocker: Turning BitLocker into ransomware SOC, TI and IR posts ‧ Cristian Souza, Eduardo Ovalle, Ashley Muñoz, Christopher Zachor
2024-05-23 A journey into forgotten Null Session and MS-RPC interfaces Research ‧ Haidar Kabibo
2024-05-22 Stealers, stealers and more stealers Malware reports ‧ GReAT
2024-05-15 QakBot attacks with Windows zero-day (CVE-2024-30051) Software ‧ Boris Larin, Mert Degirmenci
2024-05-14 Incident response analyst report 2023 SOC, TI and IR posts ‧ Kaspersky GERT, Kaspersky Security Services
2024-05-09 APT trends report Q1 2024 APT reports ‧ GReAT
2024-05-08 State of ransomware in 2024 Publications ‧ Kaspersky
2024-05-07 Exploits and vulnerabilities in Q1 2024 Publications ‧ Alexander Kolesnikov, Vitaly Morgunov
2024-05-06 Financial cyberthreats in 2023 Publications ‧ Kaspersky
2024-04-30 Managed Detection and Response in 2023 SOC, TI and IR posts ‧ Kaspersky Security Services
2024-04-24 Assessing the Y, and How, of the XZ Utils incident Incidents ‧ GReAT
2024-04-22 ToddyCat is making holes in your infrastructure APT reports ‧ Andrey Gunkin, Alexander Fedotov, Natalya Shornikova
2024-04-18 DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware APT reports ‧ GReAT
2024-04-17 SoumniBot: the new Android banker’s unique techniques Malware descriptions ‧ Dmitry Kalinin
2024-04-15 Using the LockBit builder to generate targeted ransomware Malware descriptions ‧ Eduardo Ovalle, Francesco Figurelli, Cristian Souza, Ashley Muñoz
2024-04-12 XZ backdoor story – Initial analysis Incidents ‧ GReAT
2024-03-28 DinodasRAT Linux implant targeting entities worldwide Malware descriptions ‧ Anderson Leite, Lisandro Ubiedo
2023-08-30 IT threat evolution in Q2 2023. Non-mobile statistics Malware reports ‧ AMR
2023-08-30 IT threat evolution in Q2 2023. Mobile statistics Malware reports ‧ Anton Kivva
2023-08-30 IT threat evolution in Q2 2023 Malware reports ‧ David Emm
2023-08-25 Lockbit leak, research opportunities on tools leaked from TAs Research ‧ Eduardo Ovalle, Francesco Figurelli
2023-08-14 Phishing with hacked sites Spam and phishing ‧ Tatyana Machneva, Olga Svistunova
2023-08-10 Focus on DroxiDat/SystemBC APT reports ‧ Kurt Baumgartner
2023-08-10 Common TTPs of attacks against industrial organizations Industrial threats ‧ Kirill Kruglov, Vyacheslav Kopeytsev, Artem Snegirev
2023-08-03 What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot Malware reports ‧ GReAT
2023-07-28 Anomaly detection in certificate-based TGT requests Research ‧ Alexander Rodchenko
2023-07-27 APT trends report Q2 2023 APT reports ‧ GReAT
2023-07-19 Comprehensive analysis of initial attack samples exploiting CVE-2023-23397 vulnerability Research ‧ Francesco Figurelli, Eduardo Ovalle
2023-07-05 Email crypto phishing scams: stealing from hot and cold crypto wallets Spam and phishing ‧ Roman Dedenok, Konstantin Zykov
2023-06-28 Andariel’s silly mistakes and a new malware family Malware reports ‧ GReAT, Kaspersky ICS CERT
2023-06-27 How cybercrime is impacting SMBs in 2023 Publications ‧ Kaspersky
2023-06-22 LockBit Green and phishing that targets organizations Malware reports ‧ GReAT
2023-06-21 Dissecting TriangleDB, a Triangulation spyware implant Malware descriptions ‧ Georgy Kucherin, Leonid Bezvershenko, Igor Kuznetsov
2023-06-20 A bowl full of security problems: Examining the vulnerabilities of smart pet feeders Research ‧ Roland Sako
2023-06-15 Understanding Malware-as-a-Service SOC, TI and IR posts ‧ Kaspersky Security Services, Alexander Zabrovsky
2023-06-12 Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency Malware reports ‧ GReAT, Sergey Lozhkin
2023-06-07 IT threat evolution Q1 2023 Malware reports ‧ David Emm
2023-06-07 IT threat evolution Q1 2023. Mobile statistics Malware reports ‧ Anton Kivva

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选

Sponsors

今日解忧 - 赛博修行,舒缓静心,21世纪解压神器!
今日历 - 全球最全的日历,日历届的航空母舰!
百晓生AI - 全能创作助手

猜你喜欢