How attackers adapt to built-in macOS protection Summarize with AI1 day ago securelist.comAlexander Chudnov
Exploits and vulnerabilities in Q2 2025 Summarize with AI4 days ago securelist.comAlexander Kolesnikov
GodRAT – New RAT targeting financial institutions Summarize with AI12 days ago securelist.comSaurabh Sharma
Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824 Summarize with AI13 days ago securelist.comSergey Lozhkin, Leonid Bezvershenko, Kirill Korche...
New trends in phishing and scams: how AI and social media are changing the game Summarize with AI18 days ago securelist.comOlga Altukhova
Scammers mass-mailing the Efimer Trojan to steal crypto Summarize with AI23 days ago securelist.comArtem Ushkov, Vladimir Gursky
Driver of destruction: How a legitimate driver is being used to take down AV processes Summarize with AI25 days ago securelist.comCristian Souza, Ashley Muñoz, Eduardo Ovalle, Fran...
Cobalt Strike Beacon delivered via GitHub and social media Summarize with AIabout 1 month ago securelist.comMaxim Starodubov, Valery Akulenko, Danila Semenov
ToolShell: a story of five vulnerabilities in Microsoft SharePoint Summarize with AIabout 1 month ago securelist.comBoris Larin, Georgy Kucherin, Ilya Savelyev