Security news that informs and inspires

All Articles

2327 articles:

Google Gives Enterprises Control of Workspace Encryption Keys

Google Workspace's new client-side encryption feature allows enterprises to control their own keys.

Google, Encryption

Law Enforcement Agencies Disrupt Slilpp Underground Marketplace

The FBI and international law enforcement agencies have disrupted Slilpp, allegedly the largest online marketplace for stolen credentials.

Government

JBS Paid $11 Million Ransom

Food producer JBS USA said it paid an $11 million ransom to resolve the ransomware attack that hit the company on May 30.

Ransomware

Microsoft Fixes Six Zero Days Used in Attacks

Microsoft's June Patch Tuesday includes fixes for six vulnerabilities that have been used in attacks in the wild.

Microsoft, Patch Tuesday

Colonial Pipeline CEO Says Ransom Payment ‘Right Thing to Do’ For Country

The shutdown of the Colonial Pipeline and the payment of the ransom to restore the company's network was the right thing to do to recover from the DarkSide ransomware attack, the company's CEO said.

Ransomware, Government

Attacks Target Critical VMware vCenter Flaw

Mass scanning and exploit attempts are targeting the VMware vCenter vulnerability (CVE-2021-21985) are ongoing, with thousands of unpatched servers still online.

Vmware

U.S. Seizes $2.3 Million From DarkSide Actors Who Targeted Colonial Pipeline

The Department of Justice seized $2.3 million in Bitcoin that was part of the ransom that Colonial Pipeline paid to DarkSide ransomware actors in May.

Ransomware, Government

Finding Badness in AWS With Patrolaroid

A new tool called Patrolaroid scans AWS instances and S3 buckets for malware by taking snapshots rather than using an agent to scan production workloads.

Cloud Security, AWS

Van Buren Decision Narrows CFAA Interpretation

The Supreme Court's decision in the Van Buren case has narrowed the interpretation of the Computer Fraud and Abuse Act, providing more leeway for security research.

CFAA, Government

Securing the Open Source Software Supply Chain

Improving the security of the open source software supply chain will require better understanding of dependencies, and cooperation from developers and users.

Open Source, Supply Chain

Deciphering Real Genius

Dennis Fisher, Zoe Lindsey, and Pete Baker ride a cart through the steam tunnels to meet at the Pacific Tech lab, crank up the laser, and ponder the immortal words of Socrates, who said, "I drank what?" Get your giant tinfoil ball of popcorn ready for Real Genius!

Podcast, Hacker Movies

House Bill Would Ban States From Weakening Encryption

The ENCRPYT Act reintroduced in the House of Representatives last week would prevent states from passing laws to weaken or ban encryption.

Government, Encryption

U.S. Seizes Domains Used in Nobelium Phishing Campaign

The Department of Justice seized two domains used in the Nobelium spear-phishing campaign that impersonated the United States Agency for International Development.

Government, Russia

Nobelium Phishing Campaign Targets Government Agencies, NGOs

A phishing campaign by the Russian actor known as Nobelium impersonated the United States Agency for International Development while targeting government agencies and humanitarian groups.

Russia, Government

Chinese Cyber Espionage Actors Continue to Zero In on Pulse Secure Bugs

Two Chinese cyberespionage groups are targeting flaws in Pulse Secure VPN devices to compromise government and private networks in the U.S. and Europe.

China