We dissect a recent incident where npm packages with millions of downloads were infected by the Shai-Hulud worm. Kaspersky experts describe the starting point for the source of the infection.| Securelist
I’ve been dog-sitting Ms. Bentley Beans since last Saturday. She’ll be hanging out with me until at least the first of October. We’ve been enjoying the fall weather, though it has…| Logos con carne
Desarrollo de las amenazas informáticas en el segundo trimestre de 2025| Securelist
The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q2 2025.| Securelist
AKA Yes, of course you can run DooM! While it’s been … quite some time, I used to use an early beta of VMware 1.0 back in the day early 00’s I believe for Linux, where I could run Lotus … Continue reading →| Virtually Fun
(This is a guest post by Antoni Sawicki aka Tenox) It appears that up until just now we did not have archived copy of MS Word 6.0 for PPC. There were copies floating for Alpha and MIPS, for example https://archive.org/details/ms-word60-nt. … Continue reading →| Virtually Fun
Granted this isn’t fun. But it’s virtual. We live in an era of exciting expandable disks!| Virtually Fun
El informe contiene datos estadísticos sobre las vulnerabilidades que nuestro equipo publicó, y los exploits que investigó en el segundo trimestre de 2025, así como datos resumidos sobre el uso de frameworks C2.| Securelist
Kaspersky experts have discovered a new spyware called Batavia, which steals data from corporate devices.| securelist.com
Kaspersky experts have discovered a new SteelFox Trojan that mimics popular software like Foxit PDF Editor and JetBrains to spread a stealer-and-miner bundle.| securelist.com
This is the third part of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.| securelist.com
This is the second part of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.| securelist.com
This is part six of our study about the Common Log File System (CLFS) and five vulnerabilities in this Windows OS component that have been used in ransomware attacks throughout the year.| securelist.com