An expert at the Kaspersky AI expertise center explains how the team developed a machine-learning model to identify DLL hijacking attacks.| Securelist
We will tell you how we integrated a DLL Hijacking detection model into the Kaspersky SIEM platform and how it helped us uncover several incidents in their early stages.| Securelist
Kaspersky experts share insights into how AmCache may prove useful during incident investigation, and provide a command line tool to extract data from this artifact.| Securelist
The Sentinels League brings global threat hunters together to battle across AI, Cloud, SIEM & Endpoint surfaces for $100K in prizes and more.| SentinelOne
Researchers have uncovered Plague, a previously undetected Linux backdoor masquerading as a malicious Pluggable Authentication Module (PAM) to enable persistent SSH access and authentication bypass.| blog.polyswarm.io
SOC teams identified three clear challenges they face each day: too much data; too many tedious tasks; and, too many reporting requirements.| Help Net Security
Web browsers have evolved from passive document viewers into complex platforms essential for cloud-based work. But this transformation has also made them a prime target for cyber threats, leaving enterprises and government networks vulnerable.| MixMode
이번 글에서는 보안을 위해 설치한 스팸 방지 플러그인 CleanTalk이 오히려 사이트의 보안을 위협하게 된 두 가지 취약점의 악용 가능 여부 및 영향과, 실제로 취약한 워드프레스 플러그인 영향을 받는 사이트를 위협 헌팅 도구로 찾는 방법을 알아보도록 한다.| CIP Blog
Kaspersky's CTI analysts recently released their Asian APT groups report, including details on behavior by different adversaries. Followin...| blog.virustotal.com
Part 2 of analyzing the KrakenKeylogger Malware| Toxin Labs