- How we trained an ML model to detect DLL hijackingby Anna Pidzhakova on October 6, 2025 at 8:00 am
An expert at the Kaspersky AI expertise center explains how the team developed a machine-learning model to identify DLL hijacking attacks.
- Detecting DLL hijacking with machine learning: real-world casesby Gleb Ivanov, Andrey Gunkin on October 6, 2025 at 8:00 am
We will tell you how we integrated a DLL Hijacking detection model into the Kaspersky SIEM platform and how it helped us uncover several incidents in their early stages.
- Forensic journey: hunting evil within AmCacheby Cristian Souza on October 1, 2025 at 10:00 am
Kaspersky experts share insights into how AmCache may prove useful during incident investigation, and provide a command line tool to extract data from this artifact.
- Massive npm infection: the Shai-Hulud worm and patient zeroby Vladimir Gursky, Dmitry Vinogradov on September 25, 2025 at 10:00 am
We dissect a recent incident where npm packages with millions of downloads were infected by the Shai-Hulud worm. Kaspersky experts describe the starting point for the source of the infection.
- Threat landscape for industrial automation systems in Q2 2025by Kaspersky ICS CERT on September 19, 2025 at 10:00 am
Kaspersky industrial threat report contains statistics on various malicious objects detected and blocked on ICS computers by Kaspersky solutions in Q2 2025.
- RevengeHotels: a new wave of attacks leveraging LLMs and VenomRATby Lisandro Ubiedo on September 16, 2025 at 10:00 am
Kaspersky GReAT expert takes a closer look at the RevengeHotels threat actor’s new campaign, including AI-generated scripts, targeted phishing, and VenomRAT.
- Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP serversby Mohamed Ghobashy on September 15, 2025 at 10:00 am
Kaspersky experts discuss the Model Context Protocol used for AI integration. We describe the MCP’s architecture, attack vectors and follow a proof of concept to see how it can be abused.
- Notes of cyber inspector: three clusters of threat in cyberspaceby Kaspersky on September 10, 2025 at 2:00 pm
This report on cybercrime, hacktivist and APT groups targeting primarily Russian organizations provides an analysis and comparison of their TTPs and divides them into three clusters.
- IT threat evolution in Q2 2025. Mobile statisticsby Anton Kivva on September 5, 2025 at 9:00 am
The report contains statistics on mobile threats (malware, adware, and unwanted software for Android) for Q2 2025, as well as a description of the most notable malware types identified during the reporting period.
- IT threat evolution in Q2 2025. Non-mobile statisticsby AMR on September 5, 2025 at 9:00 am
The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q2 2025.

Securelist
We are an ethical website cyber security team and we perform security assessments to protect our clients.