Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs Summarize with AI18 days ago securelist.comSojun Ryu, Omar Amin
Deep analysis of the flaw in BetterBank reward logic Summarize with AI24 days ago securelist.comElsayed Elrefaei
The evolving landscape of email phishing attacks: how threat actors are reusing and refining established techniques Summarize with AI25 days ago securelist.comRoman Dedenok
PassiveNeuron: a sophisticated campaign targeting servers of high-profile organizations Summarize with AI25 days ago securelist.comGeorgy Kucherin, Saurabh Sharma, Vasily Berdnikov
Post-exploitation framework now also delivered via npm Summarize with AI29 days ago securelist.comVladimir Gursky, Artem Ushkov
SEO spam and hidden links: how to protect your website and your reputation Summarize with AI29 days ago securelist.comAnna Larkina
Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution Summarize with AIabout 1 month ago securelist.comGReAT
Mysterious Elephant: a growing threat Summarize with AIabout 1 month ago securelist.comNoushin Shabab, Ye Jin
Signal in the noise: what hashtags reveal about hacktivism in 2025 Summarize with AIabout 1 month ago securelist.comKaspersky Security Services