Category: Securelist

IT threat evolution in Q2 2025. Non-mobile statistics

The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q2 2025. This article has been indexed from Securelist Read the original article: IT threat evolution in Q2 2025. Non-mobile statistics

IT threat evolution in Q2 2025. Mobile statistics

The report contains statistics on mobile threats (malware, adware, and unwanted software for Android) for Q2 2025, as well as a description of the most notable malware types identified during the reporting period. This article has been indexed from Securelist…

How attackers adapt to built-in macOS protection

We analyze the built-in protection mechanisms in macOS: how they work, how threat actors can attack them or deceive users, and how to detect such attacks. This article has been indexed from Securelist Read the original article: How attackers adapt…

Exploits and vulnerabilities in Q2 2025

This report provides statistical data on published vulnerabilities and exploits we researched in Q2 2025. It also includes summary data on the use of C2 frameworks. This article has been indexed from Securelist Read the original article: Exploits and vulnerabilities…

Modern vehicle cybersecurity trends

Modern vehicles, their current and future threats, and approaches to automotive cybersecurity. This article has been indexed from Securelist Read the original article: Modern vehicle cybersecurity trends