Tag: Research
-
Forensic journey: Breaking down the UserAssist artifact structure
A Kaspersky GERT expert describes the UserAssist Windows artifact, including previously undocumented binary data structure, and shares a …
-
Oligo Security strives to fill application-layer gaps in MITRE ATT&CK framework
Applications are a common intrusion point, but the way attackers gain access, maneuver and create mayhem within and across applications …
-
Approach to mainframe penetration testing on z/OS. Deep dive into RACF
We have explored the RACF security package in z/OS and developed a utility to interact with its database. Now, we are assessing RACF …
-
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
In its annual SMB threat report, Kaspersky shares insights into trends and statistics on malware, phishing, scams, and other threats to …
-
Fewer Identity Theft Reports, Larger Losses: Here’s What to Make of Latest Research
Experts say criminals might just be using AI and other tech to get better at picking …
-
Riverside Research, Anduril Collaborate to Strengthen Cybersecurity for Defense Systems
Riverside Research has partnered with Anduril Industries to enhance the cybersecurity of critical defense capabilities. The collaboration …
-
New Research: Multi-Stage Malware Attack on Python Package Index Discovered
Researchers at JFrog have discovered that the Python Package Index (PyPI) has a malicious package in its repository. This package is able …
-
Fog Ransomware Group Uses Unconventional Toolset, New Research Finds
Research from Symantec and the Carbon Black Threat Hunter team reveals that the Fog ransomware group utilizes an uncommon toolset, …
-
Anti Data Exfiltration: Next-Generation Protection for Government Data
This eBook “Anti Data Exfiltration: Next-Generation Protection for Government Data” is part of the Tech Spotlight Series in partnership …
-
Vibe coding is here to stay. Can it ever be secure?
Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more …
-
Future-ready cybersecurity: Lessons from the MITRE CVE crisis
The recent funding crisis surrounding MITRE’s Common Vulnerabilities and Exposures (CVE) program was more than just a bureaucratic hiccup …
-
Inside the LLM system that reads emails like a cybersecurity analyst
Phishing emails, those deceptive messages designed to steal sensitive information, remain a significant cybersecurity threat. As attackers …
●●●