| | How a legitimate Windows driver is being used to take down antivirus processes (securelist.com) |
| 3 points by msephton 33 days ago | past |
|
| | Code highlighting extension for Cursor AI used for $500k theft (securelist.com) |
| 182 points by Daviey 88 days ago | past | 155 comments |
|
| | Code highlighting with Cursor AI for $500k (securelist.com) |
| 12 points by ivanjermakov 89 days ago | past | 2 comments |
|
| | $500K stolen via fake AI coding extension (securelist.com) |
| 20 points by handfuloflight 3 months ago | past | 2 comments |
|
| | Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain (securelist.com) |
| 5 points by campuscodi 6 months ago | past |
|
| | The GitVenom campaign: cryptocurrency theft using GitHub (securelist.com) |
| 14 points by miohtama 7 months ago | past | 4 comments |
|
| | OCR Crypto Stealers in Google Play and App Store (securelist.com) |
| 35 points by shifty1 8 months ago | past | 5 comments |
|
| | SparkCat Crypto Stealer in Google Play and App Store (securelist.com) |
| 2 points by janandonly 8 months ago | past |
|
| | Meet the GoldenJackal Advanced Persistent Threat (APT) Group (securelist.com) |
| 2 points by teleforce 12 months ago | past |
|
| | EastWind campaign: CloudSorcerer attacks on government organizations in Russia (securelist.com) |
| 1 point by croes on Aug 16, 2024 | past |
|
| | XZ backdoor part 3: Hook analysis (securelist.com) |
| 2 points by strunz on July 3, 2024 | past |
|
| | XZ backdoor: Hook analysis (securelist.com) |
| 11 points by skilled on June 24, 2024 | past |
|
| | Analysis of User Password Strength (securelist.com) |
| 2 points by doener on June 21, 2024 | past |
|
| | Analysis of User Password Strength (securelist.com) |
| 1 point by mikece on June 18, 2024 | past |
|
| | Bypassing 2FA with phishing and OTP bots (securelist.com) |
| 1 point by skilled on June 11, 2024 | past |
|
| | Analyzing the security properties of a ZKTeco biometric terminal (securelist.com) |
| 2 points by skilled on June 11, 2024 | past |
|
| | ShrinkLocker: Turning BitLocker into Ransomware (securelist.com) |
| 1 point by parvenu74 on May 23, 2024 | past |
|
| | Assessing the Y, and How, of the XZ Utils incident (securelist.com) |
| 2 points by netol on April 24, 2024 | past |
|
| | SoumniBot: The new Android banker's unique techniques (securelist.com) |
| 2 points by dirtyhippiefree on April 18, 2024 | past |
|
| | Top web application vulnerabilities in 2021–2023 (securelist.com) |
| 1 point by baalimago on April 16, 2024 | past |
|
| | XZ backdoor story – Initial analysis (securelist.com) |
| 406 points by kryster on April 12, 2024 | past | 250 comments |
|
| | Android malware, Android malware and more Android malware (securelist.com) |
| 21 points by mikece on March 20, 2024 | past | 2 comments |
|
| | Network Tunneling with QEMU (securelist.com) |
| 187 points by rrampage on March 6, 2024 | past | 27 comments |
|
| | An educational robot security research (securelist.com) |
| 1 point by mikece on Feb 27, 2024 | past |
|
| | Operation Triangulation: What you get when attack iPhones of researchers (securelist.com) |
| 549 points by ruik on Dec 27, 2023 | past | 399 comments |
|
| | How to catch a wild triangle (securelist.com) |
| 142 points by mmastrac on Oct 27, 2023 | past | 43 comments |
|
| | The outstanding stealth of Operation Triangulation (securelist.com) |
| 2 points by nceqs3 on Oct 24, 2023 | past |
|
| | Free Download Manager backdoored – a possible supply chain attack on Linux (securelist.com) |
| 152 points by donutshop on Sept 12, 2023 | past | 127 comments |
|
| | Spyware Telegram Mod Distributed via Google Play – Securelist (securelist.com) |
| 1 point by janandonly on Sept 8, 2023 | past | 1 comment |
|
| | Comprehensive analysis of attack samples exploiting CVE-2023-23397 vulnerability (securelist.com) |
| 2 points by mikece on July 19, 2023 | past |
|
|
| More |