Researchers believe that the Domino malware is being deployed by former Conti members and has been developed by FIN7, indicating “at least some level of collaboration between the two groups."
The cybersecurity issues challenging space systems warrant the attention and resources that come with the critical infrastructure designation, the CSC argues.
Google, Luta Security, Bugcrowd and other companies have started a new hacking Policy Council and Security Research Legal Defense Fund to help security researchers work more safely.
Researchers at SentinelLabs recently observed Transparent Tribe evolving its tactics in recent attacks against the Indian education sector.
QuaDream's spyware has been used in hacks against journalists, political dissidents and non-government organization workers in North America, Central Asia, Europe and the Middle East.
Building resilient networks that are resistant to attack and allow users to do their jobs can change the way organizations handle security.
Microsoft has patched a zero day in the Windows common log file system driver that has been actively exploited.
A critical flaw (CVE-2023-29017) has been patched in the VM2 sandbox that runs on Node.js.
Apple is warning about two zero days in macOS and iOS that are under active attack.
Microsoft, Fortra, and the Health-ISAC have obtained a court order to disrupt the use of cracked copies of Cobalt Strike, which are often used in ransomware intrusions.
Mike Hanley, CSO and SVP of engineering at GitHub, joins Dennis Fisher to talk about the company's move to enforce 2FA for all developers, the changing role of the CISO, and what's ahead for software supply chain security.
U.S. law enforcement authorities have taken down the Genesis Market darknet marketplace, which sold stolen data and initial access.
Google's elite Threat Analysis Group has revealed more details of the North Korean APT43 group, which is refers to as Archipelago.
A backdoor named Gopuram used by the Lazarus Group has been found in a small number of environments compromised in the 3CX supply chain attack.
The supply chain attack against 3CX may have been planned for more than a year, and such intrusions are the best return on investment for attackers, researchers say.