Two hospitality merchants in North America were compromised by point-of-sale malware in May and June of this year, Visa said in a recent technical report.
The newly discovered MosaicRegressor framework has been used by attackers linked to China to deliver a UEFI rootkit in some targets.
The EARN IT Act has now made its was into the House of Representatives, with a key change from the Senate version's stance on encryption.
GitHub has released a new code-scanning feature for both public and private repositories that finds security flaws before they make it into a codebase.
There are multiple distinct banking Trojan families in Latin America, rather than one large group as has been previously believed, ESET researchers said at the Virus Bulletin 2020 conference.
Larry Cashdollar, a senior security researcher at Akamai, joins Dennis Fisher to talk about 20 years of vulnerability research and the many different ways that things can go sideways.
A security incident at Universal Health Services has taken the network of the large health system offline.
Organizations are increasingly developing incident response playbooks to plan out in advance what steps to take in case of a security breach—such as an employees accessing files without authorization, a lost computer, or a server compromised by outside attackers. A team of academics from the UK's University of Kent and University of Warwick outlined a comprehensive playbook on how organizations should communicate after a security incident.
The Zerologon vulnerability Microsoft patched in Windows Server last month is actively being exploited in several attacks, Microsoft warned.
An intruder breached a federal agency’s internal network and accessed data files using compromised credentials and custom malware, the Cybersecurity and Infrastructure Security Agency said in an Analysis Report.
CISA alerted administrators that activity from the LokiBot information stealing trojan has been increasingly sharply since July.
The SAFE DATA Act is the latest attempt to pass a national privacy law, but it relies on notice-and-consent and does not apply to federal agencies.
Federal agencies have until the end of Monday to install fixes for a recently-fixed elevation of privilege vulnerability in Windows which could be used to take control of the entire network, CISA said in an emergency directive.
MITRE’s latest project is a public library of detailed plans replicating tactics and techniques used by known attack groups. The first set of adversary emulation plans released this week describe the behavior of cybercrime group FIN6.
A large coalition of privacy and civil liberty groups have sent a letter urging senators to oppose the EARN IT Act.