Sponsor of the Day:
Jerkmate
https://securelist.com/tag/microsoft-windows/
Tag: Microsoft Windows | Securelist
tag microsoftwindowssecurelist
https://securelist.com/tags/
All Tags | Securelist
tagssecurelist
https://securelist.com/pipemagic/117270/
PipeMagic in 2025: How the backdoor operators’ tactics have changed | Securelist
Aug 25, 2025 - We examine the evolution of the PipeMagic backdoor and the TTPs of its operators – from the RansomExx incident in 2022 to attacks in Brazil and the Middle...
2025backdoortacticschangedsecurelist
https://securelist.com/what-happens-to-stolen-data-after-phishing-attacks/118180/
Where does the data stolen in a phishing attack go? | Securelist
Dec 11, 2025 - Kaspersky experts detail the journey of the victims’ data after a phishing attack. We break down the use of email-based phishing kits, Telegram bots, and...
data stolenphishing attackgosecurelist
https://securelist.com/category/great-research/
Category: GReAT research | Securelist
This category describes articles prepared by experts of Kaspersky's Global Research and Analysis Team (GReAT).
categorygreatresearchsecurelist
https://securelist.com/ksb-privacy-predictions-2024/111815/
Kaspersky predictions on privacy in 2024 | Securelist
Jan 25, 2024 - Kaspersky experts review their privacy predictions for 2023 and last year’s trends, and try to predict what privacy concerns and solutions are to come in 2024.
kaspersky predictions2024 securelistprivacy
https://securelist.com/category/incidents/
Category: Incidents | Securelist
Recent website hacks, malware epidemies, data leaks and other information security incidents.
categoryincidentssecurelist
https://securelist.com/author/saurabhsharma/
Author: Saurabh Sharma | Securelist
saurabh sharmaauthorsecurelist
https://securelist.com/webinars/the-darknet-market-of-corporate-data/
Dark market for corporate data: how cybercriminals sell access to your company | Securelist
In this webinar, Kaspersky’s Security Services experts shed light on how a company’s data and the information on their systems is sold on darknet markets.
dark marketcorporate datasell accesscybercriminalscompany
https://securelist.com/threat-category/unix-macos-malware/
Threat Category: Unix and macOS malware | Securelist
Threats for macOS and Unix-like systems.
threat categorymacos malwareunixsecurelist
https://securelist.com/industrial-threat-report-q3-2025/118602/
Industrial threat report for Q3 2025 | Securelist
Dec 25, 2025 - The report contains statistics on various threats detected and blocked on ICS computers in Q3 2025, including miners, ransomware, spyware, etc.
industrial threat reportq3 2025 securelist
https://securelist.com/webinars/kaspersky-scan-engine-built-to-integrate-engineered-to-protect/
Kaspersky Scan Engine webinar | Securelist
In this webinar you’ll discover how real companies are integrating Scan Engine into their ecosystems – from mail filters to network storage – to stop threats...
scan enginewebinar securelistkaspersky
https://securelist.com/litellm-supply-chain-attack/119257/
Why is the LiteLLM AI gateway compromise so dangerous? | Securelist
Mar 27, 2026 - Dissecting the supply chain attack on LiteLLM, a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to...
ai gatewaylitellmcompromisedangeroussecurelist
https://securelist.com/new-ransomware-trends-in-2023/109660/
Overview of ransomware trends in 2023 | Securelist
May 10, 2023 - On the eve of the global Anti-Ransomware Day, Kaspersky researchers share an overview of the key trends observed among ransomware groups.
ransomware trends2023 securelistoverview
https://securelist.com/author/santiago/
Author: Santiago Pontiroli | Securelist
authorsantiagosecurelist
https://securelist.com/webinar-category/technologies-and-services/
Webinar Category: Technologies and services | Securelist
webinarcategorytechnologiesservicessecurelist
https://securelist.com/it-threat-evolution-q2-2024-mobile-statistics/113678/
Android malware and unwanted software statistics for Q2 2024 | Securelist
Sep 3, 2024 - The report gives statistics on mobile malware and unwanted software for Q2 2024, including mobile banking Trojans and ransomware.
q2 2024 securelistandroid malwareunwanted softwarestatistics
https://securelist.com/author/sergeypolitsyn/
Author: Sergey Politsyn | Securelist
authorsergeysecurelist
https://securelist.com/it-threat-evolution-q1-2023-pc-statistics/109917/
Non-mobile malware statistics, Q1 2023 | Securelist
Aug 18, 2023 - PC malware statistics for the Q1 2023 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices.
non mobilemalware statisticsq1 2023securelist
https://securelist.com/tag/botnets/
Tag: Botnets | Securelist
tagbotnetssecurelist
https://securelist.com/fleckpe-a-new-family-of-trojan-subscribers-on-google-play/109643/
Subscription Trojans on Google Play | Securelist
May 4, 2023 - The new Trojan family, Fleckpe, spreads via Google Play inside photo editors and wallpapers, subscribing the unaware user to paid services.
google playsubscriptiontrojanssecurelist
https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange | Securelist
Dec 19, 2022 - At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The...
cve 2022zero daysms exchangesecurelist
https://securelist.com/author/ashleymunoz/
Author: Ashley Muñoz | Securelist
author ashleysecurelist
https://securelist.com.br/
Securelist Brazil | Pesquisa e relatórios de ameaças da Kaspersky
O blog Securelist reúne relatórios de inteligência sobre ameaças, pesquisas de malware, análises de APT e estatísticas da Kaspersky
pesquisa eda kasperskysecurelistbrazilde
https://securelist.com/modern-ransomware-groups-ttps/106824/
The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs | Securelist
Sep 16, 2024 - We want to familiarize the reader with the different stages of ransomware deployment and provide a visual guide to defending against targeted ransomware...
hateful eightguidemodernransomwarettps
https://securelist.com/vulnerabilities-and-exploits-in-q1-2025/116624/
Vulnerability landscape analysis for Q1 2025 | Securelist
Oct 2, 2025 - This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the...
q1 2025 securelistvulnerability landscapeanalysis
https://securelist.com/author/costin/
Author: Costin Raiu | Securelist
authorcostinsecurelist
https://securelist.lat/ntlm-abuse-in-2025/100602/
Cómo se explota NTLM en los ciberataques de 2025 | Securelist
Dec 2, 2025 - Este artículo aborda NTLM relay, el reenvío de credenciales y otras vulnerabilidades y ciberataques relacionados con NTLM que fueron descubiertos en 2025.
en losde 2025seexplotantlm
https://securelist.com/author/alexanderakozlov/
Author: Alexander Kozlov | Securelist
author alexanderkozlovsecurelist
https://securelist.com/av-killer-exploiting-throttlestop-sys/117026/
ThrottleStop driver abused to terminate AV processes | Securelist
Aug 8, 2025 - In an incident response case, Kaspersky experts discovered new malware that terminates AV processes by abusing the legitimate ThrottleStop driver. Kaspersky...
driverabusedterminateavprocesses
https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/
Vulnerability landscape analysis for Q4 2024 | Securelist
Feb 26, 2025 - This report provides statistics on vulnerabilities and exploits and discusses the most frequently exploited vulnerabilities in Q4 2024.
vulnerability landscapeq4 2024analysissecurelist
https://securelist.com/model-context-protocol-for-ai-integration-abused-in-supply-chain-attacks/117473/
Malicious MCP servers used in supply chain attacks | Securelist
Sep 15, 2025 - Kaspersky experts discuss the Model Context Protocol used for AI integration. We describe the MCP’s architecture, attack vectors and follow a proof of concept...
supply chain attacksmcp serversmalicioususedsecurelist
https://securelist.com/ksb-2024-statistics/114795/
Kaspersky Security Bulletin 2024. Statistics | Securelist
Dec 4, 2024 - The “Kaspersky Security Bulletin 2024. Statistics” report contains statistics on cyberthreats for the period from November 2023 through October 2024. It covers...
kaspersky security bulletin2024 statisticssecurelist
https://securelist.com/soc-files-web-shell-chase/115714/
Kaspersky SOC analyzes an incident involving a web shell used as a backdoor | Securelist
Sep 8, 2025 - Kaspersky SOC analysts discuss a recent incident where the well-known Behinder web shell was used as a post-exploitation backdoor, showing how web shells have...
incident involvingweb shellbackdoor securelistkasperskysoc
https://securelist.com/malware-report-q1-2025-mobile-statistics/116676/
Mobile threat report for Q1 2025 | Securelist
Jun 6, 2025 - The number of attacks on mobile devices involving malware, adware, or unwanted apps saw a significant increase in the first quarter.
q1 2025 securelistmobile threatreport
https://securelist.com/threat-category/secure-environment/
Threat Category: Secure environment (IoT) | Securelist
Threats for smart homes, connected cars, smart bracelets and other smart devices.
threat categorysecure environmentiotsecurelist
https://securelist.com/webinars/kasperskys-way-of-cloud-workload-protection/
Cloud workload protection webinar | Securelist
Applications and services, often built using containers, offer efficiency for developers but create nightmares for security teams. A comprehensive approach is...
cloud workload protectionwebinar securelist
https://securelist.com/detecting-dll-hijacking-with-machine-learning-in-kaspersky-siem/117567/
How a machine-learning model in Kaspersky SIEM detected DLL-hijacking incidents | Securelist
Oct 2, 2025 - We will tell you how we integrated a DLL Hijacking detection model into the Kaspersky SIEM platform and how it helped us uncover several incidents in their...
machine learning modelkasperskysiemdetecteddll
https://securelist.com/vulnerability-report-q1-2024/112554/
Analyzing the vulnerability landscape in Q1 2024 | Securelist
Sep 10, 2024 - The report provides vulnerability and exploit statistics, key trends, and analysis of interesting vulnerabilities discovered in Q1 2024.
q1 2024 securelistvulnerability landscapeanalyzing
https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/
Keyloggers: How they work and how to detect them (Part 1) | Securelist
Mar 3, 2022 - This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to...
part 1keyloggersworkdetectsecurelist
https://securelist.com/tag/malware-technologies/
Tag: Malware Technologies | Securelist
tagmalwaretechnologiessecurelist
https://securelist.com/tag/malware-descriptions/
Tag: Malware Descriptions | Securelist
tagmalwaredescriptionssecurelist
https://securelist.ru/author/great/
Архив: GReAT | Securelist
greatsecurelist
https://securelist.com/it-threat-evolution-q1-2024-pc-statistics/112754/
Non-mobile malware statistics, Q1 2024 | Securelist
Jun 3, 2024 - In this report, Kaspersky shares non-mobile malware statistics for Q1 2024, including ransomware, miner and macOS malware statistics.
q1 2024 securelistnon mobilemalware statistics
https://securelist.com/ksb-dark-web-predictions-2025/114966/
Dark market overview and predictions for 2025 | Securelist
Dec 16, 2024 - Kaspersky experts review dark market trends in 2024, such as popularity of cryptors, loaders and crypto drainers on the dark web, and discuss what to expect in...
dark market2025 securelistoverviewpredictions
https://securelist.com/industrial-threat-landscape-q1-2024/112683/
Threat landscape for industrial automation systems, Q1 2024 | Securelist
May 27, 2024 - In this report Kaspersky ICS CERT shares statistics on threats blocked on ICS computers globally and in separate regions in Q1 2024: share of attacked...
industrial automation systemsq1 2024 securelistthreat landscape
https://securelist.com/malware-report-q3-2024/114678/
Malware report for Q3 2024: threat overview | Securelist
Nov 29, 2024 - In this part of the malware report we discuss the most remarkable findings of Q3 2024, including APT and hacktivist attacks, ransomware, stealers, macOS...
q3 2024malwarereportthreatoverview
https://securelist.com/gopix-banking-trojan/119173/
GoPix banking Trojan targeting Brazilian financial institutions | Securelist
Mar 16, 2026 - Kaspersky GReAT experts describe the unprecedentedly complex Brazilian banking Trojan GoPix that employs memory-only implants, Proxy AutoConfig (PAC) files for...
banking trojanfinancial institutionstargetingbraziliansecurelist
https://securelist.com/machine-learning-in-threat-hunting/114016/
How machine learning helps us hunt threats | Securelist
Oct 3, 2024 - How Kaspersky implemented machine learning for threat hunting in Kaspersky Security Network (KSN) global threat data.
machine learninghelps usthreats securelisthunt
https://securelist.com/webinars/fortify-your-mobile-protection-building-customer-trust-with-advanced-security/
Kaspersky Mobile Security SDK webinar | Securelist
Join our webinar to discover how the Kaspersky Mobile Security SDK provides powerful protection. We will demonstrate key security features to safeguard user...
mobile security sdkwebinar securelistkaspersky
https://securelist.com/it-threat-evolution-q2-2024-pc-statistics/113683/
Statistics on PC malware for Q2 2024 | Securelist
Sep 3, 2024 - This report presents statistics on PC threats for Q2 2024, including data on ransomware, miners, threats to macOS and IoT devices.
q2 2024 secureliststatisticspcmalware
https://securelist.com/malware-report-q1-2025-pc-iot-statistics/116686/
Desktop and IoT threat statistics for Q1 2025 | Securelist
Aug 18, 2025 - The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q1 2025.
q1 2025 securelistiot threatdesktopstatistics
https://securelist.com/webinars/silent-shields-digital-dragons-mdrs-proactive-protection/
Kaspersky Managed Detection and Response in 2024 | Securelist
Join Kaspersky Managed Detection and Response webinar to understand who are your potential attackers, what methods they’re using and how to detect their...
managed detection2024 securelistkasperskyresponse
https://securelist.com/webinars/the-power-of-threat-attribution/
The Power of Threat Attribution | Securelist
Our experts will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence...
threat attributionpowersecurelist
https://securelist.com/date/2011/
Year: 2011 | Securelist
year 2011securelist
https://securelist.com/tag/shellcode/
Tag: shellcode | Securelist
tagshellcodesecurelist
https://securelist.com/hot-and-cold-cryptowallet-phishing/110136/
Phishing scams that target hot and cold crypto wallets | Securelist
Jul 3, 2023 - Here is how email phishing scams targeting hot and cold crypto wallets, such as Trezor and Ledger, work.
phishing scamscrypto walletstargethotcold
https://securelist.com/malware-report-q3-2025-mobile-statistics/118013/
Android threat report for Q3 2025 | Securelist
Nov 19, 2025 - The report features statistics on mobile threats for the third quarter of 2025, along with interesting findings and trends from the quarter, including an...
q3 2025 securelistthreat reportandroid
https://securelist.com/author/pavelsinenko/
Author: Pavel Sinenko | Securelist
authorpavelsecurelist
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
Operation Triangulation: The last (hardware) mystery | Securelist
Apr 23, 2025 - Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this...
operation triangulationlasthardwaremysterysecurelist
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
Coruna framework: an exploit kit and ties to Operation Triangulation | Securelist
Mar 25, 2026 - Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an...
exploit kitoperation triangulationcorunaframeworkties
https://securelist.com/userassist-artifact-forensic-value-for-incident-response/116911/
What is UserAssist and how to use it in IR activities? | Securelist
Oct 1, 2025 - A Kaspersky GERT expert describes the UserAssist Windows artifact, including previously undocumented binary data structure, and shares a useful parsing tool.
ir activitiesusesecurelist
https://securelist.com/goodbye-dark-telegram/118286/
An analysis of a shadow Telegram channel’s lifespan | Securelist
Dec 9, 2025 - Kaspersky researchers analyze changes in the lifespan of a shadow Telegram channel, blocks, and migration to other platforms.
analysisshadowtelegramlifespansecurelist
https://securelist.com/author/alexanderliskin/
Author: Alexander Liskin | Securelist
author alexandersecurelist
https://securelist.com/crimeware-report-android-malware/112121/
Kaspersky crimeware report: Android malware | Securelist
Apr 2, 2025 - In this report, we share our latest Android malware findings: the Tambir spyware, Dwphon downloader and Gigabud banking Trojan.
android malwarekasperskycrimewarereportsecurelist
https://securelist.com/webinar-category/cyberthreat-talks/
Webinar Category: Cyberthreat talks | Securelist
webinarcategorycyberthreattalkssecurelist
https://securelist.com/author/ilyasavelyev/
Author: Ilya Savelyev | Securelist
authorilyasecurelist
https://securelist.com/tomiris-new-tools/118143/
New Tomiris tools and techniques: multiple reverse shells, Havoc, AdaptixC2 | Securelist
Mar 26, 2026 - Kaspersky discloses new tools and techniques discovered in 2025 Tomiris activities: multi-language reverse shells, Havoc and AdaptixC2 open-source frameworks,...
newtoolstechniquesmultiplereverse
https://securelist.com/how-we-protect-against-sunburst-backdoor/99959/
How we protect our users against the Sunburst backdoor | Securelist
May 17, 2021 - The detection logic has been improved in all our solutions to ensure our customers protection.
backdoor securelistprotectuserssunburst
https://securelist.com/passiveneuron-campaign-with-apt-implants-and-cobalt-strike/117745/
Cyberespionage campaign PassiveNeuron targets machines running Windows Server | Securelist
Nov 17, 2025 - Kaspersky GReAT experts break down a recent PassiveNeuron campaign that targets servers worldwide with custom Neursite and NeuralExecutor APT implants and...
cyberespionage campaignrunning windowstargetsmachinesserver
https://securelist.ru/threat-category/finansovye-ugrozy/
Категория угроз: Финансовые угрозы | Securelist
Вредоносное ПО для банкоматов, троянцы-вымогатели, майнеры, банкеры и другие угрозы.
securelist
https://securelist.com/tag/social-engineering/
Tag: Social engineering | Securelist
tag socialengineeringsecurelist
https://securelist.com/features-of-secure-os-realization/77469/
Features of secure OS realization | Securelist
Mar 27, 2023 - There are generally accepted principles that developers of all secure operating systems strive to apply, but there can be completely different approaches to...
secure osfeaturesrealizationsecurelist
https://securelist.com/sexi-key-group-mallox-ransomware/113183/
Leaked ransomware variants give rise to new cybercrime groups | Securelist
Aug 13, 2024 - Kaspersky researchers investigated three ransomware groups that tapped newly built malware samples based on Babuk, Lockbit, Chaos and others, while lacking...
give risenew cybercrimeleakedransomwarevariants
https://securelist.com/apt-luminousmoth/103332/
LuminousMoth APT: Sweeping attacks for the chosen few | Securelist
Jul 29, 2021 - We recently came across unusual APT activity in South East Asia . Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to...
aptsweepingattackschosensecurelist
https://securelist.com/author/antonkivva/
Author: Anton Kivva | Securelist
authorantonsecurelist
https://securelist.com/author/pierredelcher/
Author: Pierre Delcher | Securelist
authorpierresecurelist
https://securelist.com/windows-clfs-exploits-ransomware-october-2022/111591/
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) | Securelist
Dec 21, 2023 - This is part four of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware...
ransomware operators exploitoctober 2022windowsclfsfive
https://securelist.com/apt-annual-review-2021/105127/
APT annual review 2021 | Securelist
Dec 6, 2021 - For this annual review, we have tried to focus on what we consider to be the most interesting trends and developments of the last 12 months.
annual reviewapt2021securelist
https://securelist.com/librarian-ghouls-apt-wakes-up-computers-to-steal-data-and-mine-crypto/116536/
Librarian Ghouls APT carries out attacks with data theft and crypto miner deployment | Securelist
Aug 1, 2025 - According to Kaspersky, Librarian Ghouls APT continues its series of attacks on Russian entities. A detailed analysis of a malicious campaign utilizing RAR...
data theftcrypto minerlibrarianghoulsapt
https://securelist.com/author/romannazarov/
Author: Roman Nazarov | Securelist
author romannazarovsecurelist
https://securelist.com/author/dandemeter/
Author: Dan Demeter | Securelist
author dandemetersecurelist
https://securelist.com/author/sojunryu/
Author: Sojun Ryu | Securelist
authorryusecurelist
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
Evolution of Zanubis, a banking Trojan for Android | Securelist
Sep 16, 2025 - A comprehensive historical breakdown of Zanubis’ changes, including RC4 and AES encryption, credentials stealing and new targets in Peru, provided by Kaspersky...
banking trojanandroid securelistevolution
https://securelist.com/three-hacktivist-apt-clusters-tools-and-ttps/117324/
Analyzing the TTPs of hacktivists and APTs targeting Russian organizations | Securelist
Sep 10, 2025 - This report on cybercrime, hacktivist and APT groups targeting primarily Russian organizations as well as assets in European, Asian, and Middle Eastern...
targeting russianorganizations securelistanalyzingttpshacktivists
https://securelist.com/nullmixer-oodles-of-trojans-in-a-single-dropper/107498/
NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist
Sep 29, 2022 - NullMixer is a dropper delivering a number of Trojans, such as RedLine Stealer, SmokeLoader, Satacom, and others.
redline stealermalware securelistdrops
https://securelist.com/betterbank-defi-protocol-esteem-token-bonus-minting/117822/
The BetterBank DeFi protocol exploited for reward minting | Securelist
Oct 23, 2025 - Kaspersky experts break down the recent BetterBank incident involving ESTEEM token bonus minting due to the lack of liquidity pool validation.
defi protocolexploitedrewardmintingsecurelist
https://securelist.com/cve-2024-30051/112618/
QakBot attacks with CVE-2024-30051 Windows zero-day | Securelist
May 17, 2024 - In April 2024, while researching CVE-2023-36033, we discovered another zero-day elevation-of-privilege vulnerability, which was assigned CVE-2024-30051...
windows zero daycve 2024qakbotattackssecurelist
https://securelist.com/ghostcontainer/116953/
GhostContainer backdoor for Exchange servers | Securelist
Jul 23, 2025 - In an incident response case in Asia, Kaspersky researchers discovered a new backdoor for Microsoft Exchange servers, based on open-source tools and dubbed...
exchange serversbackdoorsecurelist
https://securelist.ru/category/malware-reports/
Category: Отчеты о вредоносном ПО | Securelist
Ежеквартальные отчеты о вредоносном ПО, сводные публикации о финансовых, мобильных или других угрозах.
categorysecurelist
https://securelist.com/vulnerabilities-and-exploits-in-q3-2025/118197/
Analyzing the vulnerability landscape in Q3 2025 | Securelist
Mar 26, 2026 - This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data...
q3 2025 securelistvulnerability landscapeanalyzing
https://securelist.com/tag/spyware/
Tag: Spyware | Securelist
tagspywaresecurelist
https://securelist.com/spam-report-q3-2019/95177/
Spam and phishing in Q3 2019 | Securelist
Sep 16, 2020 - Top in this quarter’s list of spam-source countries is China, with a share of 20.43%. Our security solutions blocked 48,089,352 malicious mail attachments,...
2019 securelistspamphishingq3
https://securelist.ru/clipbanker-malware-distributed-via-trojanized-proxifier/115138/
Троянец типа ClipBanker притворяется ПО Proxifier | Securelist
Apr 15, 2026 - Под видом ПО Proxifier злоумышленники распространяют троянца, который в результате длинной цепочки заражения доставляет на устройство ClipBanker — зловред,...
proxifiersecurelist
https://securelist.com/author/elsayedelrefaei/
Author: Elsayed Elrefaei | Securelist
authorsecurelist
https://securelist.com/tag/trojan/
Tag: Trojan | Securelist
tag trojansecurelist
https://securelist.com/author/suguru/
Author: Suguru Ishimaru | Securelist
authorsuguruishimarusecurelist
https://securelist.com/crimeware-report-stealers/112633/
Crimeware report: Acrid, ScarletStealer and Sys01 stealers | Securelist
Aug 9, 2024 - In this report, we discuss two new stealers: Acrid and ScarletStealer, and an evolution of the known Sys01 stealer, with the latter two dividing stealer...
crimewarereportstealerssecurelist
https://securelist.com/webinars/mdr-report-2023-analyzing-the-state-of-the-global-threat-landscape/
MDR report 2023: Analyzing the state of the global threat landscape | Securelist
On the MDR report 2023 webinar you will understand who are your potential attackers, how they operate today and how their activity can be detected.
global threat landscapemdr report2023analyzingstate
https://securelist.com/cve-2025-55182-exploitation/118331/
Attacks on Kaspersky honeypots exploit CVE-2025-55182 | Securelist
Mar 3, 2026 - Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here’s what you need to know about the vulnerability, how our honeypots are...
cve 2025 55182attackskasperskyhoneypotsexploit