What is UserAssist and how to use it in IR activities?

Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on…

GhostContainer backdoor for Exchange servers

In a recent incident response (IR) case, we discovered highly customized malware targeting Exchange infrastructure within…

Kaspersky industrial threat report for Q1 2025

Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects…

Coinbase is the best-performing stock in the S&P 500 in June, and may have even more room to run

People watch as the logo for Coinbase, the biggest U.S. cryptocurrency exchange, is displayed on the…

How to use buyer journey keyword research to unlock SEO-generated revenue

I know the impact of ignoring buyer’s journey keywords all too well. Early in my SEO…

How to create an effective Facebook ads strategy in 2025

Facebook ads can be incredibly powerful — when they’re done right. Most marketers say it consistently…

28 free advertising tips for your small, large, or local business

When I first started my small business, advertising seemed daunting. With a limited budget, I couldn’t…

Dero miner spreads inside containerized Linux environments

Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an…

Evolution of Zanubis, a banking Trojan for Android

Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022. Since its inception, it…

Vulnerability landscape analysis for Q1 2025

The first quarter of 2025 saw the continued publication of vulnerabilities discovered and fixed in 2024,…