Digital Forensics and Incident Response Specialist
Ahmad Zaidi Said, a Malaysian cybersecurity expert with broad international experience, has more than 14 years of knowledge and experience in the field and has been involved in high-profile cybersecurity incident investigations globally. Joined Kaspersky Global Emergency Response Team (GERT) in 2021 as Digital Forensics and Incident Response (DFIR) specialist, Zaidi brings valuable experience in a variety of cyber security domains, including digital forensics and incident response (DFIR), malware analysis and reverse engineering, threat intelligence, and threat hunting Zaidi is a committee member of the Malaysia Cyber Security Community Organization (MCCO) & rawSEC and active member of the High Technology Cyber Investigation Association (HTCIA), which contribute to the evolution of the cybersecurity ecosystem through information sharing and collaboration. His expertise has also led him to speak at a number of international and local events, in which he has offered vital insights and best practises with a wide range of audiences.Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.
Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.
Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas.
Kaspersky’s GReAT experts have uncovered a new wave of cyberattacks by the ForumTroll APT group, targeting Russian political scientists and delivering the Tuoni framework to their devices.