OceanLotus suspected of using PyPI to deliver ZiChatBot malware Summarize with AI44 minutes ago securelist.comGReAT
Websites with an undefined trust level: avoiding the trap Summarize with AIabout 4 hours ago securelist.comLama Saqqour, Anna Larkina
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security Summarize with AI2 days ago securelist.comRoman Dedenok
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India Summarize with AI6 days ago securelist.comAnton Kargin, Vladimir Gursky, Victoria Vlasova, A...
PhantomRPC: A new privilege escalation technique in Windows RPC Summarize with AI12 days ago securelist.comHaidar Kabibo
FakeWallet crypto stealer spreading through iOS apps in the App Store Summarize with AI16 days ago securelist.comSergey Puzan
Threat landscape for industrial automation systems in Q4 2025 Summarize with AI21 days ago securelist.comKaspersky ICS CERT
JanelaRAT: a financial threat targeting users in Latin America Summarize with AI23 days ago securelist.comGReAT
The long road to your crypto: ClipBanker and its marathon infection chain Summarize with AI27 days ago securelist.comOleg Kupreev
Financial cyberthreats in 2025 and the outlook for 2026 Summarize with AI28 days ago securelist.comOlga Altukhova, Oleg Kupreev, Polina Tretyak