VMware confirmed that the critical command injection flaw (CVE-2023-20887) is being exploited in the wild.
The China-based hacking group has targeted ministries of foreign affairs across the Americas with updated malware called Graphican.
The Department of Justice hopes that its new National Security Cyber Section will improve cybercriminal investigations with more dedicated resources, speed and organizational support.
The malware, which has been used in an espionage attack since 2022, includes a capability that specifically targets the client drive mapping feature within Remote Desktop Protocol.
Matt Johansen joins Dennis Fisher to discuss his path from infosec n00b to senior security roles at White Hat, Bank of America, Reddit and his new newsletter and podcast venture Vulnerable U.
Ruslan Magomedovich Astamirov allegedly worked as a LockBit affiliate and launched five ransomware attacks between 2020 and 2023.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
A new vulnerability (CVE-2023-35708) in MOVEit Transfer has been disclosed and Progress Software is urging customers to update immediately to prevent exploits.
Researchers point to an “aggressive and skilled actor” with suspected links to China as the group behind the attacks on a recently disclosed Barracuda ESG zero day.
The threat actor behind the WhisperGate malware has been identified as a distinct Russian GRU group.
The new directive from CISA aims to help federal agencies identify and secure their network devices that are exposed to the public internet.
The LockBit ransomware group was the most active in the world last year, according to a new advisory, and has collected nearly $100 million in ransoms in three years.
A Chinese cyberespionage group known as UNC3886 has been exploiting a new zero day (CVE-2023-20867) in VMware Tools.
Fortinet has released new firmware updates to patch a remote code execution vulnerability (CVE-2023-27997) that affects all versions of the FortiGate appliance.
According to a watchdog report, the National Nuclear Security Administration is still in the "early stages" of fully implementing security measures across its operational technology (OT) and nuclear weapons IT environments.