Security news that informs and inspires

All Articles

2327 articles:

Wiper Malware Hits Organizations in Ukraine

Researchers observed wiper malware and DDoS attacks impacting organizations in Ukraine this week.

Malware, Cyberattack

Dridex Malware Spreads Entropy Ransomware In Recent Cyberattacks

Researchers point to a possible common origin between the Dridex malware and Entropy ransomware due to code similarities.

Malware, Ransomware

Sandworm Group Deploying New Cyclops Blink Malware

The Russian Sandworm threat actor has been deploying a new piece of malware called Cyclops Blink, warns CISA and NSA.

Malware, Russia

Decipher Podcast: Nitin Natarajan

Nitin Natarajan, deputy director for the Cybersecurity and Infrastructure Security Agency (CISA), talks about how the agency is tackling various emerging security challenges more effectively.

Podcast, CISA

GitHub Opens Up Security Advisory Database

GitHub is opening is security Advisory Database to contributions to the community, allowing new research and improvements to help secure the software supply chain.

Github

Hybrid Workforces Face Unique Phishing Challenges

Phishing attacks have increased across the board over the past year as companies continue to grapple with unique remote and hybrid work environment challenges.

Phishing, Remote Work

IRS Facial Recognition Backlash Highlights Broader Privacy Concerns

Facial recognition technology is coming under fire for privacy concerns around how biometrics data is collected, stored and used.

Facial Recognition, Privacy

Decipher Podcast: Source Code 2/18

Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.

Podcast, Source Code

New FBI Unit Will Focus on Cryptocurrency Exploitation

The FBI is forming a new Virtual Asset Exploitation unit to trace cryptocurrency crimes and ransomware profits.

Government, Ransomware

Threat Actor Exploits Log4j Flaw in VMware Horizon

Researchers said an Iran-linked threat actor was exploiting the Log4j vulnerability in order to deploy backdoors, harvest credentials and other malicious activities.

Log4j, Vmware

CISA Orders Federal Agencies to Patch Exploited Google, Adobe Flaws

Federal agencies have until March 1 to fix a pair of actively exploited flaws in Google Chrome and Adobe's Commerce and Magento platforms.

CISA, Google, Google Chrome, Zero Day

Threat Actor Targets Transportation Firms in Malware Campaigns

Researchers detailed a threat actor that has launched campaigns targeting the transportation and manufacturing sector for five years.

Threat Actors, Malware

Linux Kernel Stack Overflow Patched

A remotely exploitable stack overflow (CVE-2022-0435) in the TIPC module of the Linux kernel has been patched.

Linux

Q&A: Chris Eng

Chris Eng, chief research officer at Veracode, recently joined Dennis Fisher on the Decipher podcast to talk about the company's new State of Software Security report and trends in enterprise security.

Software Security

Decipher Podcast: Chris Eng

Chris Eng of Veracode joins Dennis Fisher to talk about the company's new State of Software Security report and what's driving the increase in enterprises scanning their apps for vulnerabilities.

Podcast, Vulnerabilities