LockBit’s macOS ransomware version is in active development and currently poses no risk to Mac users, but security researchers are concerned about future ransomware threats to the macOS landscape.
Researchers warn of a "significant increase" in emails aiming to deliver the Qakbot malware.
Researchers believe that the Domino malware is being deployed by former Conti members and has been developed by FIN7, indicating “at least some level of collaboration between the two groups."
The cybersecurity issues challenging space systems warrant the attention and resources that come with the critical infrastructure designation, the CSC argues.
Google, Luta Security, Bugcrowd and other companies have started a new hacking Policy Council and Security Research Legal Defense Fund to help security researchers work more safely.
Researchers at SentinelLabs recently observed Transparent Tribe evolving its tactics in recent attacks against the Indian education sector.
QuaDream's spyware has been used in hacks against journalists, political dissidents and non-government organization workers in North America, Central Asia, Europe and the Middle East.
Building resilient networks that are resistant to attack and allow users to do their jobs can change the way organizations handle security.
Microsoft has patched a zero day in the Windows common log file system driver that has been actively exploited.
A critical flaw (CVE-2023-29017) has been patched in the VM2 sandbox that runs on Node.js.
Apple is warning about two zero days in macOS and iOS that are under active attack.
Microsoft, Fortra, and the Health-ISAC have obtained a court order to disrupt the use of cracked copies of Cobalt Strike, which are often used in ransomware intrusions.
Mike Hanley, CSO and SVP of engineering at GitHub, joins Dennis Fisher to talk about the company's move to enforce 2FA for all developers, the changing role of the CISO, and what's ahead for software supply chain security.
U.S. law enforcement authorities have taken down the Genesis Market darknet marketplace, which sold stolen data and initial access.
Google's elite Threat Analysis Group has revealed more details of the North Korean APT43 group, which is refers to as Archipelago.