Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of…
Category: News
What is UserAssist and how to use it in IR activities?
Introduction As members of the Global Emergency Response Team (GERT), we work with forensic artifacts on…
GhostContainer backdoor for Exchange servers
In a recent incident response (IR) case, we discovered highly customized malware targeting Exchange infrastructure within…
Kaspersky industrial threat report for Q1 2025
Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects…
Dero miner spreads inside containerized Linux environments
Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an…
Evolution of Zanubis, a banking Trojan for Android
Introduction Zanubis is a banking Trojan for Android that emerged in mid-2022. Since its inception, it…
Vulnerability landscape analysis for Q1 2025
The first quarter of 2025 saw the continued publication of vulnerabilities discovered and fixed in 2024,…
How to find container-based threats in host-based logs
The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this…
Mobile threat report for Q1 2025
IT threat evolution in Q1 2025. Mobile statisticsIT threat evolution in Q1 2025. Non-mobile statistics Quarterly…
Desktop and IoT threat statistics for Q1 2025
IT threat evolution in Q1 2025. Non-mobile statisticsIT threat evolution in Q1 2025. Mobile statistics The…