Security news that informs and inspires

All Articles

2230 articles:

Microsoft to Block Macros by Default in Office Apps

Microsoft is blocking macros by default for Office, which it hopes will make abuse by cybercriminals more difficult.

Microsoft, Spear Phishing, Email

Collaboration Key to Log4j Response

The cooperative efforts of the private sector and CISA's Joint Cyber Defense Collaborative helped limit the damage of the recent Log4j vulnerability.

Log4j, Government

DoJ Seizes $3.6 Billion in Bitcoin Stolen From Bitfinex Hack

U.S. officials arrested two individuals and seized $3.6 billion in bitcoin related to the 2016 Bitfinex hack.

Cryptocurrency, Cyberattack

Microsoft Details Malware Attacks on Ukrainian Organizations

Microsoft said the Actinium threat group (also known as Gamaredon) has been observed targeting government, military and law enforcement organizations in Ukraine with spear-phishing emails.

Malware, Russia

Attackers Use SEO Poisoning to Spread Malware, Steal Credentials

SEO-friendly websites promising Zoom or TeamViewer application installations are actually attacker-owned and deploy malware.

Malware, Credentials

Decipher Podcast: Source Code 2/4

Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.

Source Code, Podcast

DHS Launches Cyber Safety Review Board

The board, tasked with identifying and sharing lessons learned from “significant cybersecurity events," will first assess the Log4j logging library flaw.

DHS, Government Agencies, Government

Critical Samba Remote Code Execution Flaw Fixed

A Samba bug could allow remote attackers without authentication to execute arbitrary code as root on impacted systems.

Vulnerability, Samba

Alpha-Omega Project Aims to Secure Open Source Ecosystem

The new Alpha-Omega Project from the Open Source Security Foundation will offer technical and financial assistance to open source maintainers to help them find and fix security flaws.

Log4j, Heartbleed, Opensource

The Hunt For a Federal Data Privacy Law

Privacy experts pinpoint the challenges and complexities behind a federal data privacy law.

Data Privacy, Federal Cybersecurity, Federal

Decipher Podcast: Source Code 1/28

Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.

Podcast, Source Code

Decipher Podcast: Jon Callas

Jon Callas, director of technology projects with EFF, talks about invasive data tracking and surveillance during the pandemic.

Podcast, Privacy

BotenaGo Malware Source Code Uploaded to GitHub

The source code's release on GitHub can potentially mean future attacks on IoT devices and routers, warn researchers.

Iot Security, Source Code, Malware

‘Every Intrusion Attempt Has a Story to Tell’

Developing good communication and storytelling skills can be a vital career step for cyber threat intelligence professionals.

Threat Intelligence

Serious Privilege Escalation Flaw in Linux Component Patched

A local privilege escalation bug in the Polkit Linux component could allow an attacker to gain root privileges with a simple exploit.

Linux