Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.
Jon Callas, director of technology projects with EFF, talks about invasive data tracking and surveillance during the pandemic.
The source code's release on GitHub can potentially mean future attacks on IoT devices and routers, warn researchers.
Developing good communication and storytelling skills can be a vital career step for cyber threat intelligence professionals.
A local privilege escalation bug in the Polkit Linux component could allow an attacker to gain root privileges with a simple exploit.
The White House has outlined a number of cybersecurity measures that federal agencies must adopt - as part of an overall zero-trust strategy - though it acknowledges that the transition "will not be a quick or easy task."
Timo Steffens, private security researcher and author of Attribution of Advanced Persistent Threats, discusses some of the top roadblocks that researchers face during attribution.
Researchers found an announcement on an underground forum for LockBit Linux-ESXi Locker version 1.0 in October.
Three remote code execution bugs in the PrinterLogic platform have been patched. The bugs could allow an attacker to run arbitrary code on any connected endpoint.
The Russian incursion into Ukraine is prompting warnings from the DHS and security researchers about the potential for Russian cyberattacks on U.S. companies.
Researchers have been tracking the malware packer since 2020 in dozens of campaigns that have impacted hundreds of victims.
Welcome to Source Code, Decipher’s weekly news podcast with input from our sources.
The known tactic, which helps attackers sidestep detection, has been observed in spam messages that deploy Emotet.
A bug in many version of the Rust programming language could allow an attacker to trick a program into deleting files and directories.
Microsoft researchers observed attackers exploiting the Log4Shell bug in the SolarWinds Serv-U software.