Tag: TI and IR posts
-
Incident response analyst report 2024
Kaspersky provides incident response statistics for 2024, as well real incidents analysis. The report also shares IR trends and …
-
The SOC files: Chasing the web shell
Kaspersky SOC analysts discuss a recent incident where the well-known Behinder web shell was used as a post-exploitation backdoor, showing …
-
Managed detection and response in 2024
The Kaspersky Managed Detection and Response report includes trends and statistics based on incidents identified and mitigated by …
-
One policy to rule them all
How cyberattackers exploit group policies, what risks attacks like these pose, and what measures can be taken to protect against such …
-
Attackers exploiting a patched FortiClient EMS vulnerability in the wild
Kaspersky’s GERT experts describe an incident with initial access to enterprise infrastructures through a FortiClient EMS vulnerability …
-
Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses
Kaspersky experts analyze cyberdefense weak points, including patch management, policy violations and MSSP issues, and real-world cases …
-
Whispers from the Dark Web Cave. Cyberthreats in the Middle East
The Kaspersky Digital Footprint Intelligence team shares insights into the H1 2024 Middle Eastern cyberthreat landscape: hacktivism, …
-
A deep dive into the most interesting incident response cases of last year
Kaspersky Global Emergency Response Team (GERT) shares the most interesting IR cases for the year 2023: insider attacks, ToddyCat-like APT, …
-
Approach to mainframe penetration testing on z/OS
We explain how mainframes work, potential attack vectors, and what to focus on when pentesting such …
-
Tusk: unraveling a complex infostealer campaign
Kaspersky researchers discovered Tusk campaign with ongoing activity that uses Danabot and StealC infostealers and clippers to obtain …
-
Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK
How a SOC can efficiently manage priorities when writing detection logic for various MITRE ATT&CK techniques and what tools can …
-
Trusted relationship attacks: trust, but verify
We analyze the tactics and techniques of attackers targeting organizations through trusted relationships – that is, through contractors …
●●●