Researchers began to detect exploit attempts in the wild targeting the patched, high-severity flaw in TP-Link routers starting on April 11.
Government officials talked about how agencies have partnered to address election security, the SolarWinds cyberattack and the Hafnium threat group's exploitation of Exchange servers.
A new macOS malware, called "RustBucket," is used in a multi-stage attack.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
Ransomware actors are utilizing a tool that abuses an out-of-date Windows driver in order to kill security software.
Casey Ellis, founder and CTO of Bugcrowd, joins Dennis Fisher to discuss the newly formed Hacking Policy Council, the challenges of influencing security research policy and legislation, and what the council hopes to achieve.
An intrusion at a separate company led to the supply chain attack on 3CX that was disclosed last month, investigators said.
The Chrome flaw is the second zero-day bug in a week that Google has addressed.
GitHub is launching two new features that enable developers to create a private vulnerability reporting channel and provide provenance attestations for their packages.
More ransomware groups are developing custom tools for data exfiltration, to deploy second-stage malware and more.
The Russian APT28 group is exploiting a six-year-old vulnerability in some Cisco IOS and IOS XE router software to install malware known as Jaguar Tooth.
LockBit’s macOS ransomware version is in active development and currently poses no risk to Mac users, but security researchers are concerned about future ransomware threats to the macOS landscape.
Researchers warn of a "significant increase" in emails aiming to deliver the Qakbot malware.
Researchers believe that the Domino malware is being deployed by former Conti members and has been developed by FIN7, indicating “at least some level of collaboration between the two groups."
The cybersecurity issues challenging space systems warrant the attention and resources that come with the critical infrastructure designation, the CSC argues.