The attack on IT outsourcing giant Wipro appears to have been motivated by gift card fraud, not espionage or a supply-chain attack against another company.
The Sodinokibi ransomware is being installed on vulnerable Oracle WebLogic servers that haven't been patched against CVE-2019-2725.
Bessemer System Federal Credit Union is suing Fiserv for not fixing the security issues in its banking platform, and says that thousands of small banks and credit union using the same software don’t even know their customer data is also vulnerable.
As Congress considers various privacy bills, advocates are pushing for a federal data protection agency to enforce any new law.
Docker revoked tokens linking GitHub and Bitbucket with Docker Hub accounts after discovering "unauthorized access" in its Hub database. Developers should check their code to ensure no unauthorized changes have been made.
Researchers from NCC Group developed an attack that can pull private keys from the hardware-backed keystore in some Qualcomm chips.
Criminals Hosting Phishing Kits on GitHub
Users who hate having to change their Windows passwords every 60 days can rejoice: Microsoft now agrees that there is no point to forced password changes and will be removing that recommendation from its security recommendations.
The DNSpionage attack group is now using a new backdoor called Karkoff, which may have ties to the OilRig leaks as well.
BEC scams continue to rise and accounted for $1.2 billion in losses in 2018. The good news is that the FBI was able to work with banks to recover some of the funds.
A series of targeted phishing campaigns have hit victims in government finance agencies and embassies in several European and African countries.
“Bug bounty apostate” and Luta Security founder Katie Moussouris said bug bounty programs have veered away from their original mission: help organizations become more secure.
Google is planning to block sign-in attempts from embedded browser frameworks soon to help defeat some phishing attacks.
An unknown leaker is publishing hacking tools used by the APT34 attack group that has been linked to Iranian intelligence.
The endpoint is still the most important part of enterprise defense, but Absolute Software's analysis found that throwing more security agents at an endpoint doesn’t make the system more secure.