The ransomware task force said in their latest progress report that private sector organizations, governments and cryptocurrency entities need to work together more in swapping information about cyber incidents.
A recent APT campaign shows how threat actors are adding complexity to the decade-old attack.
The newest version of the EARNT IT Act still has language that would force platform providers to weaken or abandon encrypted services.
The new malware was found stealing saved usernames and passwords in browsers in order to compromise business Gmail, Outlook and Facebook accounts.
Decipher talks to Dawn Cappelli, director of OT-CERT at Dragos, about the challenges of securing operational technology, particularly for organizations with limited budget and resources.
Iranian threat groups are launching cyberattacks - or in some cases saying they are - and then sowing fear around the hacks through online influence operations.
Apple and Google have submitted a draft IETF specification to alert users when they are being tracked by Bluetooth accessories such as AirTags.
Google is enabling passkeys as a login method for all accounts as part of its effort to move users away from passwords to more secure authentication methods.
The cybersecurity framework is getting an overhaul as NIST aims to better incorporate supply chain risk management and governance.
Enterprise networks have evolved rapidly in recent years, but the security industry hasn't been as agile and is not keeping up with the pace of change.
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents at organizations.
This week at the RSA Conference, software supply-chain security, CISO liabilities and public-private sector partnerships were some of the key topics.
Microsoft has attributed exploitation attempts of CVE-2023-27350 and CVE-2023-27351 to a Clop ransomware affiliate.
A new court order allows Google to take down current and future domains tied to the distribution of the CryptBot infostealer.
At the RSA Conference this week, government officials and cybersecurity executives mulled over the multiple layers of challenges in securing the software supply chain.