Kaspersky’s Global Research and Analysis Team (GReAT) has publicly exposed an active, server‑focused cyberespionage campaign — tracked as PassiveNeuron — that has compromised Internet‑facing Windows Server systems in government, financial and industrial environments across Asia, Africa and Latin...
RefreshOS 2.5 arrives as a carefully curated Debian-based distro that grafts a KDE Plasma desktop shell onto a deliberately mixed bag of applications — and, in doing so, trades orthodox desktop purity for a pragmatic, user-focused experience that is both attractive and slightly divisive...
China-linked state actors have spent the last several years systematically compromising backbone and edge networking equipment — from provider-edge routers to customer-facing devices — to build a global espionage capability that steals subscriber metadata, intercepts authentication traffic, and...
In 2025, Microsoft 365 remains a cornerstone of organizational productivity, yet it continues to be a prime target for cyber threats. Understanding and mitigating these threats is crucial for maintaining a secure digital environment.
1. Phishing Attacks and Business Email Compromise (BEC)...
Microsoft’s March 2025 Patch Tuesday: Analyzing the Security Implications of 57 Fixed Flaws and the PipeMagic Threat
Microsoft’s Patch Tuesday for March 2025 stands out as a critical milestone in the ongoing struggle to secure Windows environments worldwide. With 57 newly patched...
Microsoft's Patch Tuesday on March 11, 2025, presented a typical suite of bug fixes, but it soon became clear that one particular vulnerability they rated "less likely" to be exploited was being weaponized aggressively by attackers. This flaw, identified as CVE-2025-24054, involves an NTLM (NT...
Innovative Phishing Tactics Threaten Critical Infrastructure
Russian state-backed APT group Storm-2372 has triggered a new alarm in the cybersecurity community by leveraging an ingenious form of device code phishing to sidestep multi-factor authentication (MFA). This sophisticated attack...
The latest report from cybersecurity firm ESET has once again shone a harsh light on the evolving tactics of China-aligned advanced persistent threat (APT) groups. In a high-stakes campaign spanning across the Americas, the notorious FamousSparrow – also known as Salt Typhoon – has deployed its...
Original release date: December 2, 2021
Summary
This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise framework for referenced threat actor techniques and for mitigations.
This joint...
Original release date: November 17, 2021
Summary
Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity
• Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591.
• Implement Link Removed.
•...
Original release date: March 18, 2021
Summary
This Alert announces the CISA Hunt and Incident Response Program (CHIRP) tool. CHIRP is a forensics collection tool that CISA developed to help network defenders find indicators of compromise (IOCs) associated with activity detailed in the following...
Original release date: December 17, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure...
Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&CK for...
Original release date: October 27, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.
This joint cybersecurity advisory...
apt
command and control
credential harvesting
cyber threats
cybersecurity
data exfiltration
espionage
hidden cobra
incident response
keylogger
kimsuky
malware
mitre att&ck
north korea
phishing
security best practices
social engineering
spear phishing
tactics
threat intelligence
Original release date: October 9, 2020
Summary
This joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques.
Note: the analysis in this joint...
Original release date: October 1, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques.
In light of heightened tensions between the United States and...
Original release date: September 14, 2020
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics...
Original release date: April 8, 2020
Summary
This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
This alert provides information on...
Original release date: July 1, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
This advisory—written by the...
anonymity
apt
cisa
command and control
cybersecurity
data exfiltration
data manipulation
denial of service
exploitation
fbi
incident response
indicators of compromise
malicious software
network monitoring
network security
reconnaissance
risk mitigation
security software
threat actors
tor
Original release date: October 3, 2018
Systems Affected
Network Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...