Category: Securelist

Forensic journey: Breaking down the UserAssist artifact structure

A Kaspersky GERT expert describes the UserAssist Windows artifact, including previously undocumented binary data structure, and shares a useful parsing tool. This article has been indexed from Securelist Read the original article: Forensic journey: Breaking down the UserAssist artifact structure

Code highlighting with Cursor AI for $500,000

Kaspersky GReAT experts uncover malicious extensions for Cursor AI that download the Quasar backdoor and a crypto stealer. This article has been indexed from Securelist Read the original article: Code highlighting with Cursor AI for $500,000

Toxic trend: Another malware threat targets DeepSeek

Kaspersky GReAT experts discovered a new malicious implant: BrowserVenom. It enables a proxy in browsers like Chrome and Mozilla and spreads through a DeepSeek-mimicking phishing website. This article has been indexed from Securelist Read the original article: Toxic trend: Another…

Toxic trend: Another malware threat targets DeepSeek

Kaspersky GReAT experts discovered a new malicious implant: BrowserVenom. It enables a proxy in browsers like Chrome and Mozilla and spreads through a DeepSeek-mimicking phishing website. This article has been indexed from Securelist Read the original article: Toxic trend: Another…

IT threat evolution in Q1 2025. Mobile statistics

The number of attacks on mobile devices involving malware, adware, or unwanted apps saw a significant increase in the first quarter. This article has been indexed from Securelist Read the original article: IT threat evolution in Q1 2025. Mobile statistics

IT threat evolution in Q1 2025. Non-mobile statistics

The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q1 2025. This article has been indexed from Securelist Read the original article: IT threat evolution in Q1 2025. Non-mobile statistics

Exploits and vulnerabilities in Q1 2025

This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the first quarter of 2025. This article has been indexed from Securelist Read the original article: Exploits and vulnerabilities…

Using a Mythic agent to optimize penetration testing

Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike. This article has been indexed from Securelist Read the original article: Using a Mythic agent to optimize penetration testing