Anatomy of a Cyber World Global Report 2026
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要快速浏览一下这篇文章。看起来是关于Kaspersky的安全服务报告,包括MDR、IR和CA这些服务。里面提到了全球范围内的客户分布、 telemetry数据、安全事件统计以及一些关键趋势和漏洞利用情况。 接下来,我要提取主要信息:Kaspersky的安全服务覆盖了企业威胁保护的各个方面,包括MDR、IR和CA。报告中分析了2025年的数据,涉及全球不同地区的客户分布情况,以及 telemetry事件的数量和处理流程。 然后是安全事件的行业分布,政府和工业部门仍然是主要目标,IT行业增长显著。关键趋势包括高严重性事件减少、微软产品漏洞被广泛利用、初始攻击向量的变化以及常用工具如PowerShell等的使用情况。 最后,报告还提供了详细分析和真实案例研究。 现在我要把这些信息浓缩到100字以内。要确保涵盖主要的服务、数据分析、行业分布、趋势以及报告的详细内容。 可能的结构:Kaspersky的安全服务报告分析了2025年的全球数据,涵盖MDR、IR和CA服务。数据显示政府和工业部门仍是主要目标,IT行业攻击增加。高严重性事件减少,微软漏洞被广泛利用。初始攻击向量转向公共应用和信任关系。常用工具如PowerShell被滥用。报告还包括详细分析和案例研究。 检查字数是否在100字以内,并调整用词使其更简洁。 </think> Kaspersky安全服务报告分析了2025年全球网络安全数据,涵盖MDR、IR和CA服务。数据显示政府和工业部门仍是主要目标,IT行业攻击增加。高严重性事件减少,微软漏洞被广泛利用。初始攻击向量转向公共应用和信任关系。常用工具如PowerShell被滥用。报告还包括详细分析和案例研究。 2026-3-25 11:0:56 Author: securelist.com(查看原文) 阅读量:3 收藏

SOC, TI and IR posts

SOC, TI and IR posts

minute read

Kaspersky Security Services provide a comprehensive cybersecurity ecosystem, taking enterprise threat protection to another level. Services like Kaspersky Managed Detection and Response and Compromise Assessment allow for timely detection of threats and cyberattacks. SOC Consulting provides a practical approach ensuring the corporate infrastructure stays secured, while Incident Response is suited for timely remediation with a maximized recovery rate.

High-level overview of the MDR, IR and CA connection

High-level overview of the MDR, IR and CA connection

This new report brings together statistics across regions and industries from our Managed Detection and Response and Incident Response services, and for the first time, it also includes insights from our Compromise Assessment and SOC Consulting services — all to provide you with more comprehensive view of different aspects of corporate information security worldwide.

The scope of MDR and IR services

Provision of Kaspersky’s MDR and IR services follows a global approach. The majority of customers accounted for the CIS (34.7%), the Middle East (20.1%), and Europe (18.6%).

Distribution of customers by geographical region, 2025

Distribution of customers by geographical region, 2025

MDR telemetry

Following the previous year’s numbers, in 2025, the MDR infrastructure received and processed an average of 15,000 telemetry events per host every day, generating security alerts as a result. These alerts are first processed by AI-powered detection logic, after which Kaspersky SOC analysts handle them as required. Overall, a total of approximately 400,000 alerts were generated in 2025. After counting out false positives, 39,000 alerts were further investigated.

MDR telemetry statistics, 2025

MDR telemetry statistics, 2025

Incident statistics

The distribution of remediation requests by industry has slightly changed as compared to previous years’ pattern. Government (18.5%) and industrial (16.6%) organizations are still the most targeted industries in regards to cyberattacks that require incident response activities. However, this year, the IT sector saw a growth in the number of IR requests, eventually being placed third in the overall industry distribution rankings and thus replacing financial organizations, which were targeted less often than in 2024. This is equally true for smaller-scale attacks that can be contained and remediated through automated means — the only difference is that medium- and low-severity incidents are more often experienced by financial organizations.

Distribution of all incidents by industry sector, 2025

Distribution of all incidents by industry sector, 2025

This section presents key findings and trends in cyberattacks in 2025:

  • The number of high-severity incidents decreased, following a downward trend that we’ve been observing since 2021. The majority of those incidents account for APT attacks and red teaming exercises, which indicates two landscape trends. On the one hand, skilled adversaries make efforts to increase impact, while on the other, organizations spend more resources on probing their defense systems.
  • The most common vulnerabilities exploited in the wild were related to Microsoft products. Half of all identified CVEs led to remote code execution, notably without authentication in some cases.
  • Exploitation of public-facing applications, valid accounts, and trusted relationships remain the most popular initial vectors, and their overall share has increased, accounting to over 80% of all attacks in 2025. In particular, attacks through trusted relationships are evolving: their share has increased to 15.5% from 12.8% in 2024. They are also becoming more complex: for instance, we witnessed a case where adversaries had compromised more than two organizations in sequence to ultimately gain access to a third target.
  • Standard Windows utilities remain a popular LotL tool. Adversaries use those to minimize the risk of detection during delivery to a compromised system. The most popular LOLBins we observed in high-severity incidents were powershell.exe (14.4%), rundll32.exe (5.9%), and mshta.exe (3.8%). Among the most popular legitimate tools used in incidents we flag Mimikatz (14.3%), PowerShell (8.1%), PsExec (7.5%), and AnyDesk (7.5%).

The full 2026 Global Report provides additional information about cyberattacks, including real-world cases discovered by Kaspersky experts. We also describe SOC Consulting projects and Compromise Assessment requests. The report includes comprehensive analysis of initial attack vectors in correlation with the MITRE ATT&CK tactics and techniques and the full list of vulnerabilities that we detected during Incident Response engagements.

  • Reports

    Kaspersky researchers analyze updated CoolClient backdoor and new tools and scripts used in HoneyMyte (aka Mustang Panda or Bronze President) APT campaigns, including three variants of a browser data stealer.

    Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.

    Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.

    Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas.


    文章来源: https://securelist.com/global-report-security-services-2026/119233/
    如有侵权请联系:admin#unsafe.sh