Ursnif's newest variant, LDR4, has been reconstructed from a banking trojan into a generic backdoor.
A panel of CISOs from companies like SolarWinds and Kaseya discussed their efforts to rebuild company culture with security in mind on the heels of massive security incidents at their organizations.
Fortinet said many of its customers still have not updated to fix CVE-2022-40684, which has been under active attack for two weeks.
Details about the severity and scope of the vulnerability are still emerging, including the detection of any examples of real-world applications using vulnerable configurations of the impacted library.
A new ransomware called Prestige has hit organizations in Poland and Ukraine using a variety of deployment methods.
Researchers said the attack kill chain is the first time they observed Brute Ratel being used as a second-stage payload via a Qakbot infection.
Mass exploitation of a new Fortinet authentication bypass flaw (CVE-2022-40684) is ongoing and proof of concept exploits are available.
Welcome back to Source Code, Decipher’s weekly news wrap podcast.
The Budworm espionage group leveraged the Log4j flaw to target a number of high-value organizations worldwide, including an unnamed U.S.-based state legislature.
Google is rolling out support for passkeys in Android and Chrome in a significant step toward passwordless authentication.
Researchers at Cisco Talos have uncovered a new all-in-one C2 framework called Alchimist that has implants called Insekt for Windows and Linux.
David Agranovich, director of threat disruption with Meta, discusses how threat groups are evolving their targeting of social media platforms in malware and espionage campaigns.
Meanwhile, two exploited Exchange flaws that publicly emerged two weeks ago were not addressed in Microsoft’s update.
A newly discovered flaw (CVE-2022-38465) in some Siemens S7 PLCs can allow an attacker to extract the hardcoded private key of the controller and gain complete control.
Researchers said a new phishing-as-a-service platform features an entirely open registration process that makes it easier for cybercriminals to leverage.