
Securelist
21,810 FOLLOWERS
The resource for Kaspersky Lab experts' technical research, analysis, and thoughts. Blog topics cover Industrial threats, DDoS reports, Malware descriptions, Security technologies, Software, Spam, and Phishing reports.
Securelist
7h ago
Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome ..read more
Securelist
20h ago
The Kaspersky financial threat report for 2024 contains the main trends and statistics on financial phishing and scams, mobile and PC banking malware, as well as recommendations on how to protect yourself and your business ..read more
Securelist
4d ago
The report contains statistics on malware, initial infection vectors and other threats to industrial automation systems in Q4 2024 ..read more
Securelist
6d ago
The new Arcane stealer spreads via YouTube and Discord, collecting data from many applications, including VPN and gaming clients, network utilities, messaging apps, and browsers ..read more
Securelist
1w ago
We analyze the activities of the Head Mare hacktivist group, which has been attacking Russian companies jointly with Twelve ..read more
Securelist
1w ago
Kaspersky provides incident response statistics for 2024, as well real incidents analysis. The report also shares IR trends and cybersecurity recommendations ..read more
Securelist
2w ago
Kaspersky experts describe a new wave of attacks distributing the DCRat backdoor through YouTube under the guise of game cheats ..read more
Securelist
2w ago
In this article, we discuss the tools and TTPs used in the SideWinder APT's attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors ..read more
Securelist
2w ago
Kaspersky experts have discovered campaigns distributing stealers, malicious PowerShell scripts, and backdoors through web pages mimicking the DeepSeek and Grok websites ..read more
Securelist
2w ago
Attackers blackmail YouTubers with complaints and account blocking threats, forcing them to distribute a miner disguised as a bypass tool ..read more