Security news that informs and inspires

All Articles

1224 articles:

REvil Ransomware Group Reemerges

The REvil ransomware group has come back online after disappearing following the attack on Kaseya in July.


Exploits Circulating for Windows MSHTML Zero Day

Some proof-of-concept exploits have begun circulating for CVE-2021-40444 and no patch is yet available.

Microsoft, Vulnerability

Attackers Exploiting Critical Flaw in Zoho Password Management Tool

Attackers are exploiting an authentication bypass flaw in Zoho's ManageEngine ADSelfService Plus password management app.


Microsoft Warns of Attacks on Windows MSHTML Zero Day

Attackers are exploiting a new zero day flaw in Windows (CVE-2021-40444) in targeted attacks.


Decipher Podcast: Amélie Koran

Amélie Koran joins Dennis Fisher to talk about her start in computing with a Commodore 64, her early years in the private sector, and her security and policy work in several federal government agencies.


Slow Uptake on Critical Confluence Update

New data shows that enterprises are not updating their Confluence instances to address a critical code execution flaw.

Atlassian, Vulnerabilities

‘Drive It Like You Stole It’: When Bug Bounties Went Boom, Part Three

During Barack Obama's second term, some top administration officials began looking at bounties as a potential way to jump-start the effort to upgrade federal government's security programs. The idea was a radical one, so they decided to start slowly, by hacking the Pentagon.

Bug Bounty

Decipher Podcast: Zoe Lindsey

Dennis Fisher talks with Zoe Lindsey, one of the early Duo Security employees, about her entrance into hacker culture, finding her way in the tech world, and the importance of lifelong learning.


Uprising in the Valley: When Bug Bounties Went Boom, Part Two

Following the success of the bounty programs started by companies such as iDefense, Zero Day Initiative, and Mozilla, technology companies and platform providers began rolling out bounties of their own. Among the big players to enter the game were Google, Facebook, Yahoo, and eventually, Microsoft.

Bug Bounty

Lawyers, Bugs, and Money: When Bug Bounties Went Boom

Bug bounties have grown from a niche idea to encourage independent security research into a massive business and a legitimate career path for bug hunters in less than 15 years. This is the story of the hackers who made that happen.

Bug Bounty

Cybercriminals Beginning to Leverage Proxyware for Malware Installation

Some cybercrime groups are using trojaned proxyware installers to gain a foothold on victim machines and install malware and cryptominers.

Malware, Cryptomining

Tech Companies Pledge Billions for Critical Infrastructure Security Upgrades, Training

Google, Microsoft and IBM plan to spend billions of dollars in the next five years to aid the Biden administration's move to shore up government and critical infrastructure security.


New Tools Target Pulse Connect Secure Flaws

CISA has released analyses of five new pieces of malware being used in attacks against known bugs in Pulse Connect Secure appliances.

Vpn, Cisa

ProxyShell Attacks Escalate

Attackers are stepping up their scanning for Exchange servers vulnerable to the ProxyShell vulnerabilities and installing webshells, ransomware, and other malware.

Microsoft Security, Proxyshell

Decipher Podcast: Jonathan Mayer

Jonathan Mayer, assistant professor of computer science at Princeton University, joins Dennis Fisher to discuss the technical and legal challenges of Apple's announced CSAM scanning system.