Security news that informs and inspires

All Articles

2230 articles:

Trio of MegaRAC BMC Flaws Could Have Long Range Effects

Three vulnerabilities in the MegaRAC BMC firmware affect a long list of servers and could have seriious long term effects.

Hardware Security, Firmware Security

FreeBSD Patches RCE Flaw in Ping

The FreeBSD Project has released updates to fix a stack buffer overflow in the ping utility.

Linux

Q&A: Lucia Milica

Lucia Milica, global resident CISO at Proofpoint, talks about challenges that CISOs face when interacting with the leadership team.

CISO Q&a

LastPass Says Attacker Accessed Customer Data

LastPass says an attacker used information stolen during a previous intrusion to gain access to a cloud storage service and obtain customer data.

Password Security

Google Exposes Heliconia Exploit Framework Targeting Chrome, Firefox, Windows

Google's Threat Analysis Group has exposed a new exploit framework called Heliconia that may have been used to exploit zero days in Chrome, Firefox, and Windows.

Google, Spyware

New Chinese Cyberespionage Campaign Targets Asia, US

A newly discovered cyber espionage campaign from a Chinese threat actor is targeting Asian and US organizations with self-replicating malware called MISTCLOAK.

Malware

Google Patches Heap Overflow Zero Day in Chrome

Google has updated Chrome on the desktop and Android to address a zero day that is being exploited in the wild.

Google, Zero Day

Discontinued Web Server Poses IoT Security Risks

Researchers warn that the usage of the discontinued Boa web server is opening up SDKs and Internet of Things devices to attack.

Iot

Complex M&A Deals Pave Way For Security Gaps

The inherent complexity, speed and secrecy across the acquisitions process makes this landscape particularly lucrative for threat actors.

M&a

Q&A: Dan Lorenc

Dan Lorenc discusses the rise of software supply chain security threats, the value of accurate asset inventory, and how companies are addressing these challenges.

Supply Chain Security

Threat Actors Find Success in Callback Phishing Attacks

Researchers warn that a stealthy callback phishing attack has been targeting the legal and retail sectors with the end goal of stealing data for extortion.

Phishing

Hive Ransomware Attacks Target FortiOS, Microsoft Exchange Flaws

The Hive ransomware has victimized 1,300 companies globally as of November, in particular targeting healthcare sector organizations, according to U.S. federal agencies in a new advisory.

Ransomware

Decipher Podcast: Source Code 11/18

Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.

Podcast

LodaRAT Malware Evolves With New Functionalities

New variants of the RAT reveal added functionalities and deployment alongside other malware families.

Malware

Code Execution Flaws Found in F5 BIG-IP Appliances

Rapid7 researchers discovered two code execution flaws in several versions of the F5 BIG-IP appliances.

F5