Robuta

Sponsor of the Day: Jerkmate
https://securelist.com/tag/microsoft-windows/ Tag: Microsoft Windows | Securelist tag microsoftwindowssecurelist https://securelist.com/tags/ All Tags | Securelist tagssecurelist https://securelist.com/pipemagic/117270/ PipeMagic in 2025: How the backdoor operators’ tactics have changed | Securelist Aug 25, 2025 - We examine the evolution of the PipeMagic backdoor and the TTPs of its operators – from the RansomExx incident in 2022 to attacks in Brazil and the Middle... 2025backdoortacticschangedsecurelist https://securelist.com/what-happens-to-stolen-data-after-phishing-attacks/118180/ Where does the data stolen in a phishing attack go? | Securelist Dec 11, 2025 - Kaspersky experts detail the journey of the victims’ data after a phishing attack. We break down the use of email-based phishing kits, Telegram bots, and... data stolenphishing attackgosecurelist https://securelist.com/category/great-research/ Category: GReAT research | Securelist This category describes articles prepared by experts of Kaspersky's Global Research and Analysis Team (GReAT). categorygreatresearchsecurelist https://securelist.com/ksb-privacy-predictions-2024/111815/ Kaspersky predictions on privacy in 2024 | Securelist Jan 25, 2024 - Kaspersky experts review their privacy predictions for 2023 and last year’s trends, and try to predict what privacy concerns and solutions are to come in 2024. kaspersky predictions2024 securelistprivacy https://securelist.com/category/incidents/ Category: Incidents | Securelist Recent website hacks, malware epidemies, data leaks and other information security incidents. categoryincidentssecurelist https://securelist.com/author/saurabhsharma/ Author: Saurabh Sharma | Securelist saurabh sharmaauthorsecurelist https://securelist.com/webinars/the-darknet-market-of-corporate-data/ Dark market for corporate data: how cybercriminals sell access to your company | Securelist In this webinar, Kaspersky’s Security Services experts shed light on how a company’s data and the information on their systems is sold on darknet markets. dark marketcorporate datasell accesscybercriminalscompany https://securelist.com/threat-category/unix-macos-malware/ Threat Category: Unix and macOS malware | Securelist Threats for macOS and Unix-like systems. threat categorymacos malwareunixsecurelist https://securelist.com/industrial-threat-report-q3-2025/118602/ Industrial threat report for Q3 2025 | Securelist Dec 25, 2025 - The report contains statistics on various threats detected and blocked on ICS computers in Q3 2025, including miners, ransomware, spyware, etc. industrial threat reportq3 2025 securelist https://securelist.com/webinars/kaspersky-scan-engine-built-to-integrate-engineered-to-protect/ Kaspersky Scan Engine webinar | Securelist In this webinar you’ll discover how real companies are integrating Scan Engine into their ecosystems – from mail filters to network storage – to stop threats... scan enginewebinar securelistkaspersky https://securelist.com/litellm-supply-chain-attack/119257/ Why is the LiteLLM AI gateway compromise so dangerous? | Securelist Mar 27, 2026 - Dissecting the supply chain attack on LiteLLM, a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to... ai gatewaylitellmcompromisedangeroussecurelist https://securelist.com/new-ransomware-trends-in-2023/109660/ Overview of ransomware trends in 2023 | Securelist May 10, 2023 - On the eve of the global Anti-Ransomware Day, Kaspersky researchers share an overview of the key trends observed among ransomware groups. ransomware trends2023 securelistoverview https://securelist.com/author/santiago/ Author: Santiago Pontiroli | Securelist authorsantiagosecurelist https://securelist.com/webinar-category/technologies-and-services/ Webinar Category: Technologies and services | Securelist webinarcategorytechnologiesservicessecurelist https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/ Android malware and unwanted software statistics for Q2 2024 | Securelist Sep 3, 2024 - The report gives statistics on mobile malware and unwanted software for Q2 2024, including mobile banking Trojans and ransomware. q2 2024 securelistandroid malwareunwanted softwarestatistics https://securelist.com/author/sergeypolitsyn/ Author: Sergey Politsyn | Securelist authorsergeysecurelist https://securelist.com/it-threat-evolution-q1-2023-pc-statistics/109917/ Non-mobile malware statistics, Q1 2023 | Securelist Aug 18, 2023 - PC malware statistics for the Q1 2023 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. non mobilemalware statisticsq1 2023securelist https://securelist.com/tag/botnets/ Tag: Botnets | Securelist tagbotnetssecurelist https://securelist.com/fleckpe-a-new-family-of-trojan-subscribers-on-google-play/109643/ Subscription Trojans on Google Play | Securelist May 4, 2023 - The new Trojan family, Fleckpe, spreads via Google Play inside photo editors and wallpapers, subscribing the unaware user to paid services. google playsubscriptiontrojanssecurelist https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/ CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange | Securelist Dec 19, 2022 - At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The... cve 2022zero daysms exchangesecurelist https://securelist.com/author/ashleymunoz/ Author: Ashley Muñoz | Securelist author ashleysecurelist https://securelist.com.br/ Securelist Brazil | Pesquisa e relatórios de ameaças da Kaspersky O blog Securelist reúne relatórios de inteligência sobre ameaças, pesquisas de malware, análises de APT e estatísticas da Kaspersky pesquisa eda kasperskysecurelistbrazilde https://securelist.com/modern-ransomware-groups-ttps/106824/ The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs | Securelist Sep 16, 2024 - We want to familiarize the reader with the different stages of ransomware deployment and provide a visual guide to defending against targeted ransomware... hateful eightguidemodernransomwarettps https://securelist.com/vulnerabilities-and-exploits-in-q1-2025/116624/ Vulnerability landscape analysis for Q1 2025 | Securelist Oct 2, 2025 - This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the... q1 2025 securelistvulnerability landscapeanalysis https://securelist.com/author/costin/ Author: Costin Raiu | Securelist authorcostinsecurelist https://securelist.lat/ntlm-abuse-in-2025/100602/ Cómo se explota NTLM en los ciberataques de 2025 | Securelist Dec 2, 2025 - Este artículo aborda NTLM relay, el reenvío de credenciales y otras vulnerabilidades y ciberataques relacionados con NTLM que fueron descubiertos en 2025. en losde 2025seexplotantlm https://securelist.com/author/alexanderakozlov/ Author: Alexander Kozlov | Securelist author alexanderkozlovsecurelist https://securelist.com/av-killer-exploiting-throttlestop-sys/117026/ ThrottleStop driver abused to terminate AV processes | Securelist Aug 8, 2025 - In an incident response case, Kaspersky experts discovered new malware that terminates AV processes by abusing the legitimate ThrottleStop driver. Kaspersky... driverabusedterminateavprocesses https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/ Vulnerability landscape analysis for Q4 2024 | Securelist Feb 26, 2025 - This report provides statistics on vulnerabilities and exploits and discusses the most frequently exploited vulnerabilities in Q4 2024. vulnerability landscapeq4 2024analysissecurelist https://securelist.com/model-context-protocol-for-ai-integration-abused-in-supply-chain-attacks/117473/ Malicious MCP servers used in supply chain attacks | Securelist Sep 15, 2025 - Kaspersky experts discuss the Model Context Protocol used for AI integration. We describe the MCP’s architecture, attack vectors and follow a proof of concept... supply chain attacksmcp serversmalicioususedsecurelist https://securelist.com/ksb-2024-statistics/114795/ Kaspersky Security Bulletin 2024. Statistics | Securelist Dec 4, 2024 - The “Kaspersky Security Bulletin 2024. Statistics” report contains statistics on cyberthreats for the period from November 2023 through October 2024. It covers... kaspersky security bulletin2024 statisticssecurelist https://securelist.com/soc-files-web-shell-chase/115714/ Kaspersky SOC analyzes an incident involving a web shell used as a backdoor | Securelist Sep 8, 2025 - Kaspersky SOC analysts discuss a recent incident where the well-known Behinder web shell was used as a post-exploitation backdoor, showing how web shells have... incident involvingweb shellbackdoor securelistkasperskysoc https://securelist.com/malware-report-q1-2025-mobile-statistics/116676/ Mobile threat report for Q1 2025 | Securelist Jun 6, 2025 - The number of attacks on mobile devices involving malware, adware, or unwanted apps saw a significant increase in the first quarter. q1 2025 securelistmobile threatreport https://securelist.com/threat-category/secure-environment/ Threat Category: Secure environment (IoT) | Securelist Threats for smart homes, connected cars, smart bracelets and other smart devices. threat categorysecure environmentiotsecurelist https://securelist.com/webinars/kasperskys-way-of-cloud-workload-protection/ Cloud workload protection webinar | Securelist Applications and services, often built using containers, offer efficiency for developers but create nightmares for security teams. A comprehensive approach is... cloud workload protectionwebinar securelist https://securelist.com/detecting-dll-hijacking-with-machine-learning-in-kaspersky-siem/117567/ How a machine-learning model in Kaspersky SIEM detected DLL-hijacking incidents | Securelist Oct 2, 2025 - We will tell you how we integrated a DLL Hijacking detection model into the Kaspersky SIEM platform and how it helped us uncover several incidents in their... machine learning modelkasperskysiemdetecteddll https://securelist.com/vulnerability-report-q1-2024/112554/ Analyzing the vulnerability landscape in Q1 2024 | Securelist Sep 10, 2024 - The report provides vulnerability and exploit statistics, key trends, and analysis of interesting vulnerabilities discovered in Q1 2024. q1 2024 securelistvulnerability landscapeanalyzing https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/ Keyloggers: How they work and how to detect them (Part 1) | Securelist Mar 3, 2022 - This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to... part 1keyloggersworkdetectsecurelist https://securelist.com/tag/malware-technologies/ Tag: Malware Technologies | Securelist tagmalwaretechnologiessecurelist https://securelist.com/tag/malware-descriptions/ Tag: Malware Descriptions | Securelist tagmalwaredescriptionssecurelist https://securelist.ru/author/great/ Архив: GReAT | Securelist greatsecurelist https://securelist.com/it-threat-evolution-q1-2024-pc-statistics/112754/ Non-mobile malware statistics, Q1 2024 | Securelist Jun 3, 2024 - In this report, Kaspersky shares non-mobile malware statistics for Q1 2024, including ransomware, miner and macOS malware statistics. q1 2024 securelistnon mobilemalware statistics https://securelist.com/ksb-dark-web-predictions-2025/114966/ Dark market overview and predictions for 2025 | Securelist Dec 16, 2024 - Kaspersky experts review dark market trends in 2024, such as popularity of cryptors, loaders and crypto drainers on the dark web, and discuss what to expect in... dark market2025 securelistoverviewpredictions https://securelist.com/industrial-threat-landscape-q1-2024/112683/ Threat landscape for industrial automation systems, Q1 2024 | Securelist May 27, 2024 - In this report Kaspersky ICS CERT shares statistics on threats blocked on ICS computers globally and in separate regions in Q1 2024: share of attacked... industrial automation systemsq1 2024 securelistthreat landscape https://securelist.com/malware-report-q3-2024/114678/ Malware report for Q3 2024: threat overview | Securelist Nov 29, 2024 - In this part of the malware report we discuss the most remarkable findings of Q3 2024, including APT and hacktivist attacks, ransomware, stealers, macOS... q3 2024malwarereportthreatoverview https://securelist.com/gopix-banking-trojan/119173/ GoPix banking Trojan targeting Brazilian financial institutions | Securelist Mar 16, 2026 - Kaspersky GReAT experts describe the unprecedentedly complex Brazilian banking Trojan GoPix that employs memory-only implants, Proxy AutoConfig (PAC) files for... banking trojanfinancial institutionstargetingbraziliansecurelist https://securelist.com/machine-learning-in-threat-hunting/114016/ How machine learning helps us hunt threats | Securelist Oct 3, 2024 - How Kaspersky implemented machine learning for threat hunting in Kaspersky Security Network (KSN) global threat data. machine learninghelps usthreats securelisthunt https://securelist.com/webinars/fortify-your-mobile-protection-building-customer-trust-with-advanced-security/ Kaspersky Mobile Security SDK webinar | Securelist Join our webinar to discover how the Kaspersky Mobile Security SDK provides powerful protection. We will demonstrate key security features to safeguard user... mobile security sdkwebinar securelistkaspersky https://securelist.com/it-threat-evolution-q2-2024-pc-statistics/113683/ Statistics on PC malware for Q2 2024 | Securelist Sep 3, 2024 - This report presents statistics on PC threats for Q2 2024, including data on ransomware, miners, threats to macOS and IoT devices. q2 2024 secureliststatisticspcmalware https://securelist.com/malware-report-q1-2025-pc-iot-statistics/116686/ Desktop and IoT threat statistics for Q1 2025 | Securelist Aug 18, 2025 - The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q1 2025. q1 2025 securelistiot threatdesktopstatistics https://securelist.com/webinars/silent-shields-digital-dragons-mdrs-proactive-protection/ Kaspersky Managed Detection and Response in 2024 | Securelist Join Kaspersky Managed Detection and Response webinar to understand who are your potential attackers, what methods they’re using and how to detect their... managed detection2024 securelistkasperskyresponse https://securelist.com/webinars/the-power-of-threat-attribution/ The Power of Threat Attribution | Securelist Our experts will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence... threat attributionpowersecurelist https://securelist.com/date/2011/ Year: 2011 | Securelist year 2011securelist https://securelist.com/tag/shellcode/ Tag: shellcode | Securelist tagshellcodesecurelist https://securelist.com/hot-and-cold-cryptowallet-phishing/110136/ Phishing scams that target hot and cold crypto wallets | Securelist Jul 3, 2023 - Here is how email phishing scams targeting hot and cold crypto wallets, such as Trezor and Ledger, work. phishing scamscrypto walletstargethotcold https://securelist.com/malware-report-q3-2025-mobile-statistics/118013/ Android threat report for Q3 2025 | Securelist Nov 19, 2025 - The report features statistics on mobile threats for the third quarter of 2025, along with interesting findings and trends from the quarter, including an... q3 2025 securelistthreat reportandroid https://securelist.com/author/pavelsinenko/ Author: Pavel Sinenko | Securelist authorpavelsecurelist https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/ Operation Triangulation: The last (hardware) mystery | Securelist Apr 23, 2025 - Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this... operation triangulationlasthardwaremysterysecurelist https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/ Coruna framework: an exploit kit and ties to Operation Triangulation | Securelist Mar 25, 2026 - Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an... exploit kitoperation triangulationcorunaframeworkties https://securelist.com/userassist-artifact-forensic-value-for-incident-response/116911/ What is UserAssist and how to use it in IR activities? | Securelist Oct 1, 2025 - A Kaspersky GERT expert describes the UserAssist Windows artifact, including previously undocumented binary data structure, and shares a useful parsing tool. ir activitiesusesecurelist https://securelist.com/goodbye-dark-telegram/118286/ An analysis of a shadow Telegram channel’s lifespan | Securelist Dec 9, 2025 - Kaspersky researchers analyze changes in the lifespan of a shadow Telegram channel, blocks, and migration to other platforms. analysisshadowtelegramlifespansecurelist https://securelist.com/author/alexanderliskin/ Author: Alexander Liskin | Securelist author alexandersecurelist https://securelist.com/crimeware-report-android-malware/112121/ Kaspersky crimeware report: Android malware | Securelist Apr 2, 2025 - In this report, we share our latest Android malware findings: the Tambir spyware, Dwphon downloader and Gigabud banking Trojan. android malwarekasperskycrimewarereportsecurelist https://securelist.com/webinar-category/cyberthreat-talks/ Webinar Category: Cyberthreat talks | Securelist webinarcategorycyberthreattalkssecurelist https://securelist.com/author/ilyasavelyev/ Author: Ilya Savelyev | Securelist authorilyasecurelist https://securelist.com/tomiris-new-tools/118143/ New Tomiris tools and techniques: multiple reverse shells, Havoc, AdaptixC2 | Securelist Mar 26, 2026 - Kaspersky discloses new tools and techniques discovered in 2025 Tomiris activities: multi-language reverse shells, Havoc and AdaptixC2 open-source frameworks,... newtoolstechniquesmultiplereverse https://securelist.com/how-we-protect-against-sunburst-backdoor/99959/ How we protect our users against the Sunburst backdoor | Securelist May 17, 2021 - The detection logic has been improved in all our solutions to ensure our customers protection. backdoor securelistprotectuserssunburst https://securelist.com/passiveneuron-campaign-with-apt-implants-and-cobalt-strike/117745/ Cyberespionage campaign PassiveNeuron targets machines running Windows Server | Securelist Nov 17, 2025 - Kaspersky GReAT experts break down a recent PassiveNeuron campaign that targets servers worldwide with custom Neursite and NeuralExecutor APT implants and... cyberespionage campaignrunning windowstargetsmachinesserver https://securelist.ru/threat-category/finansovye-ugrozy/ Категория угроз: Финансовые угрозы | Securelist Вредоносное ПО для банкоматов, троянцы-вымогатели, майнеры, банкеры и другие угрозы. securelist https://securelist.com/tag/social-engineering/ Tag: Social engineering | Securelist tag socialengineeringsecurelist https://securelist.com/features-of-secure-os-realization/77469/ Features of secure OS realization | Securelist Mar 27, 2023 - There are generally accepted principles that developers of all secure operating systems strive to apply, but there can be completely different approaches to... secure osfeaturesrealizationsecurelist https://securelist.com/sexi-key-group-mallox-ransomware/113183/ Leaked ransomware variants give rise to new cybercrime groups | Securelist Aug 13, 2024 - Kaspersky researchers investigated three ransomware groups that tapped newly built malware samples based on Babuk, Lockbit, Chaos and others, while lacking... give risenew cybercrimeleakedransomwarevariants https://securelist.com/apt-luminousmoth/103332/ LuminousMoth APT: Sweeping attacks for the chosen few | Securelist Jul 29, 2021 - We recently came across unusual APT activity in South East Asia . Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to... aptsweepingattackschosensecurelist https://securelist.com/author/antonkivva/ Author: Anton Kivva | Securelist authorantonsecurelist https://securelist.com/author/pierredelcher/ Author: Pierre Delcher | Securelist authorpierresecurelist https://securelist.com/windows-clfs-exploits-ransomware-october-2022/111591/ Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) | Securelist Dec 21, 2023 - This is part four of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware... ransomware operators exploitoctober 2022windowsclfsfive https://securelist.com/apt-annual-review-2021/105127/ APT annual review 2021 | Securelist Dec 6, 2021 - For this annual review, we have tried to focus on what we consider to be the most interesting trends and developments of the last 12 months. annual reviewapt2021securelist https://securelist.com/librarian-ghouls-apt-wakes-up-computers-to-steal-data-and-mine-crypto/116536/ Librarian Ghouls APT carries out attacks with data theft and crypto miner deployment | Securelist Aug 1, 2025 - According to Kaspersky, Librarian Ghouls APT continues its series of attacks on Russian entities. A detailed analysis of a malicious campaign utilizing RAR... data theftcrypto minerlibrarianghoulsapt https://securelist.com/author/romannazarov/ Author: Roman Nazarov | Securelist author romannazarovsecurelist https://securelist.com/author/dandemeter/ Author: Dan Demeter | Securelist author dandemetersecurelist https://securelist.com/author/sojunryu/ Author: Sojun Ryu | Securelist authorryusecurelist https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/ Evolution of Zanubis, a banking Trojan for Android | Securelist Sep 16, 2025 - A comprehensive historical breakdown of Zanubis’ changes, including RC4 and AES encryption, credentials stealing and new targets in Peru, provided by Kaspersky... banking trojanandroid securelistevolution https://securelist.com/three-hacktivist-apt-clusters-tools-and-ttps/117324/ Analyzing the TTPs of hacktivists and APTs targeting Russian organizations | Securelist Sep 10, 2025 - This report on cybercrime, hacktivist and APT groups targeting primarily Russian organizations as well as assets in European, Asian, and Middle Eastern... targeting russianorganizations securelistanalyzingttpshacktivists https://securelist.com/nullmixer-oodles-of-trojans-in-a-single-dropper/107498/ NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist Sep 29, 2022 - NullMixer is a dropper delivering a number of Trojans, such as RedLine Stealer, SmokeLoader, Satacom, and others. redline stealermalware securelistdrops https://securelist.com/betterbank-defi-protocol-esteem-token-bonus-minting/117822/ The BetterBank DeFi protocol exploited for reward minting | Securelist Oct 23, 2025 - Kaspersky experts break down the recent BetterBank incident involving ESTEEM token bonus minting due to the lack of liquidity pool validation. defi protocolexploitedrewardmintingsecurelist https://securelist.com/cve-2024-30051/112618/ QakBot attacks with CVE-2024-30051 Windows zero-day | Securelist May 17, 2024 - In April 2024, while researching CVE-2023-36033, we discovered another zero-day elevation-of-privilege vulnerability, which was assigned CVE-2024-30051... windows zero daycve 2024qakbotattackssecurelist https://securelist.com/ghostcontainer/116953/ GhostContainer backdoor for Exchange servers | Securelist Jul 23, 2025 - In an incident response case in Asia, Kaspersky researchers discovered a new backdoor for Microsoft Exchange servers, based on open-source tools and dubbed... exchange serversbackdoorsecurelist https://securelist.ru/category/malware-reports/ Category: Отчеты о вредоносном ПО | Securelist Ежеквартальные отчеты о вредоносном ПО, сводные публикации о финансовых, мобильных или других угрозах. categorysecurelist https://securelist.com/vulnerabilities-and-exploits-in-q3-2025/118197/ Analyzing the vulnerability landscape in Q3 2025 | Securelist Mar 26, 2026 - This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data... q3 2025 securelistvulnerability landscapeanalyzing https://securelist.com/tag/spyware/ Tag: Spyware | Securelist tagspywaresecurelist https://securelist.com/spam-report-q3-2019/95177/ Spam and phishing in Q3 2019 | Securelist Sep 16, 2020 - Top in this quarter’s list of spam-source countries is China, with a share of 20.43%. Our security solutions blocked 48,089,352 malicious mail attachments,... 2019 securelistspamphishingq3 https://securelist.ru/clipbanker-malware-distributed-via-trojanized-proxifier/115138/ Троянец типа ClipBanker притворяется ПО Proxifier | Securelist Apr 15, 2026 - Под видом ПО Proxifier злоумышленники распространяют троянца, который в результате длинной цепочки заражения доставляет на устройство ClipBanker — зловред,... proxifiersecurelist https://securelist.com/author/elsayedelrefaei/ Author: Elsayed Elrefaei | Securelist authorsecurelist https://securelist.com/tag/trojan/ Tag: Trojan | Securelist tag trojansecurelist https://securelist.com/author/suguru/ Author: Suguru Ishimaru | Securelist authorsuguruishimarusecurelist https://securelist.com/crimeware-report-stealers/112633/ Crimeware report: Acrid, ScarletStealer and Sys01 stealers | Securelist Aug 9, 2024 - In this report, we discuss two new stealers: Acrid and ScarletStealer, and an evolution of the known Sys01 stealer, with the latter two dividing stealer... crimewarereportstealerssecurelist https://securelist.com/webinars/mdr-report-2023-analyzing-the-state-of-the-global-threat-landscape/ MDR report 2023: Analyzing the state of the global threat landscape | Securelist On the MDR report 2023 webinar you will understand who are your potential attackers, how they operate today and how their activity can be detected. global threat landscapemdr report2023analyzingstate https://securelist.com/cve-2025-55182-exploitation/118331/ Attacks on Kaspersky honeypots exploit CVE-2025-55182 | Securelist Mar 3, 2026 - Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here’s what you need to know about the vulnerability, how our honeypots are... cve 2025 55182attackskasperskyhoneypotsexploit