Security news that informs and inspires

All Articles

2244 articles:

Verizon DBIR: Enterprises Know the Pain of Zero Day Exploits All Too Well

The Verizon 2024 Data Breach Investigations Report shows a 180 percent increase in the use of vulnerability exploits in breaches from last year, thanks to MOVEit Transfer and other bugs.

Data Breach

‘Uncharted Territory:’ Companies Devise AI Security Policies

Businesses have been preparing security policies for generative AI in the workplace, but many executives say that they still don’t fully understand the security implications of AI.

AI

Memory Safe: Dennis Fisher

In a special bonus Memory Safe episode, Dennis Fisher, Decipher’s editor in chief, talks about his decades of experience writing about cybersecurity news, the article he authored that inspired him to get into the industry (hint: it involved phishing) and how the cybersecurity news world has changed over the years.

Memory Safe

Stolen Citrix Credentials Led to Change Ransomware Attack

UnitedHealth Group's CEO revealed that attackers behind the hack gained initial access by leveraging compromised credentials for a Citrix application that didn’t have multi-factor authentication enabled.

Credentials

DHS Releases AI Security Guidance for Critical Infrastructure

The DHS guidelines outline how critical infrastructure entities can best be secured against the various risks associated with AI.

DHS, AI

Decipher Podcast: Source Code 4/26

Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.

Podcast, Source Code

Cactus Ransomware Group Targets Qlik Sense Servers

Cactus ransomware actors are targeting Qlik Sense servers with exploits for three separate vulnerabilities in an ongoing campaign.

Ransomware

NSA Advisory Sheds Light on Securely Deploying AI Systems

New guidelines from the NSA highlight best security practices for deploying and operating AI systems.

AI

Ransomware Task Force: We Need to Disrupt Operations at Scale

The Ransomware Task Force’s most recent report shows how the industry needs to rely on more than takedown operations in order to have more effective, long-term impacts in combating ransomware.

Video

Defusing the Threat of Compromised Credentials

Compromised credentials are at the root of many intrusions, but there are ways to reduce the threat from stolen credentials.

Identity, Credential Theft

Decipher Podcast: Lachlan McGill and Euan Moore

The Salvation Army's Lachlan McGill and Euan Moore talk about their experiences building a strong cybersecurity foundation, navigating the organization’s unique challenges and fostering a culture around security awareness.

Security Program, Podcast

Change Healthcare Says Attackers Accessed PHI and PII

The ransomware attack on Change Healthcare included the theft of PHI and PII, the company said.

Healthcare

Nation-State Actors Exploited Ivanti Bugs to Hit MITRE

The MITRE Corporation has disclosed a breach impacting one of its collaborative networks used for research, development and prototyping.

Ivanti, MITRE Att&ck

Russian Group Forest Blizzard Deploying GooseEgg Tool to Exploit CVE-2022-38028

A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler (CVE-2022-38028) for several years.

Microsoft, Russia

Decipher Podcast: Source Code 4/19

Welcome back to the Source Code podcast, Decipher’s weekly news wrap podcast with input from our sources.

Source Code