A recent report found that phishing attacks and zero-day exploits that target mobile devices have crept up over the past year.
Researchers have observed attackers leveraging email thread hijacking tactics to spread the Qakbot malware, which in turn deploys multiple payloads.
This week's Source Code podcast by Decipher takes a look behind the scenes at top news with input from our sources.
A Canadian man who U.S. authorities allege is part of the NetWalker ransomware operation has been extradited to the U.S.
Threat actors are attempting to gain the trust of victims by pretending to be a potential customer and filling out an online contact form before launching the BazarLoader attack.
A Ukrainian man charged with using the REvil ransomware in the attack on Kaseya last summer has been extradited to the U.S. and arraigned in Texas.
Beyond the SEC, lawmakers and federal agencies at a broader level are examining cyberattack reporting deadlines.
The FBI says that the Ragnar Locker ransomware group has compromised more than 50 critical infrastructure organizations in the U.S.
Runa Sandvik, who provides consultation services to journalists for cybersecurity, explains the unique challenges that newsrooms face in securing their environments.
Patches are available for three critical-severity remote code execution flaws that affect more than 150 devices, including medical imaging and laboratory products.
Runa Sandvik discusses her work helping journalists to secure their devices and how more newsrooms are recognizing the need for better cybersecurity measures.
The prolific APT group compromised state government networks by exploiting the Log4j flaw and a vulnerability in an animal health emergency reporting system.
Two critical Firefox use-after-free zero-day vulnerabilities have been fixed.
A serious kernel bug (CVE-2022-0847) that allows an attacker to write any data to an arbitrary file has been fixed in Linux and Android.
Three vulnerabilities in some models of APC UPS devices can allow an attacker to upload a malicious firmware image and use the devices for further network attacks.