Malicious package with AdaptixC2 framework agent found in npm registry

Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative…

The Microsoft Azure Outage Shows the Harsh Reality of Cloud Failures

Microsoft’s Azure cloud platform, its widely used 365 services, Xbox, and Minecraft started suffering outages at…

Cyberespionage campaign PassiveNeuron targets machines running Windows Server

Introduction Back in 2024, we gave a brief description of a complex cyberespionage campaign that we…

Notable email phishing techniques in 2025

Introduction Cyberthreats are constantly evolving, and email phishing is no exception. Threat actors keep coming up…

The BetterBank DeFi protocol exploited for reward minting

Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on…

Mem3nt0 mori – The Hacking Team is back!

In March 2025, Kaspersky detected a wave of infections that occurred when users clicked on personalized…

BlueNoroff's latest campaigns: GhostCall and GhostHire

Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces,…

SOC files: an APT41 attack on government IT services in Africa

Introduction Some time ago, Kaspersky MDR analysts detected a targeted attack against government IT services in…

ToolShell: a story of five vulnerabilities in Microsoft SharePoint

On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of…

Targeted attacks leverage accounts on popular online platforms as C2 servers

Introduction In the latter half of 2024, the Russian IT industry, alongside a number of entities…