Security news that informs and inspires

All Articles

658 articles:

Attackers Combine Attacks Against RDP with Ransomware

Attacks using Remote Desktop Protocol continue to be tremendously successful. It turns out many attackers are combining RDP attacks with ransomware.

Ransomware, Rdp

New Tortoiseshell Campaign Targets Veterans

A fake hiring site for veterans is the latest tool deployed by the Tortoiseshell attack group.

Malware

Enterprises Lack Clear Security Guidance for 5G

Enterprises need guidance on how to get ready for 5G networks, but the current fear-mongering about Huawei doesn't give enterprises the information they need to make sure the applications are secure.

Networking, Wireless Security, Internet, 5G, Critical Infrastructure Security

Microsoft Issues Emergency Fix for Critical IE Flaw

Microsoft has pushed out an emergency patch for a critical remote code execution bug in Internet Explorer that has been exploited.

Microsoft

GitHub Beefs Up Code Scanning With Semmle

Keeping software secure isn't just the developer's job. GitHub is strengthening its ecosystem with tools for developers, researchers, and project maintainers to identify and fix software vulnerabilities.

Application Security, Open Source, Vulnerability

Cloudflare Fights Bots With Tech, Trees

Cloudflare's new "bot fight mode" protects enterprises against malicious bots with tar-pit techniques and the company pledges to plant trees to offset the carbon costs.

Botnet

‘We Have to Stop Selling Fear’

CISA Director Christopher Krebs urged the security community to move past selling based on fear.

Government

Emotet Malware Reawakens

The Emotet malware has come back to life after several months of inactivity over the summer.

Malware

Tortoiseshell Targets IT Providers in Supply Chain Attack

Supply chain attacks violate the trust organizations have in their suppliers and providers. A newly discovered attack group is brazen, compromising IT providers in order to get to their final targets.

Supply Chain, Attacker

Working Group Attempts Consensus on Encryption, Lawful Access

The "debate" over how law enforcement can have lawful access to encrypted messages is anything but civil. The Encryption Working Group attempted to find common ground and made some proposals, but no agreement on how messages can be viewed without undermining encryption.

Encryption, Government

LastPass Fixes Bug That Leaked User Credentials

A flaw in the LastPass browser extension for Chrome and Opera could leak the credential used on the previous site.

Privacy

Simjacker Attack Exploits Deep-Seated Weakness in Phones

The newly disclosed Simjacker attack allows a remote attacker to track a mobile device by exploiting a weakness deep within many phones.

Mobile Security

Decipher Podcast: Parker Thompson

Dennis Fisher talks with Parker Thompson of Cyber Independent Testing Lab about the group's IoT security study.

Podcast

NetCAT Attack Can Leak Data From Some Intel Processors

A new attack that exploits a weakness in the DDIO feature of some Intel chips can leak sensitive data, including SSH keystrokes.

Intel, Hardware

Attack on Power Utility Highlights Need for Layered Defense

The key takeaway from the NERC report about the attack against a US electric utility isn't that companies need to be patching, but that layered defense is still the best approach for keeping systems and networks safe.

Critical Infrastructure Security