Attackers are exploiting four vulnerabilities in the Accellion File Transfer Appliance, weeks after patches were released.
Confidential threat intelligence sharing could help prevent the next large-scale intrusions, tech executives say.
Better visibility into ICS environments and increased cooperation between the private sector and government are key to defeating emerging threat actors.
The Silver Sparrow malware is targeting Macs, including those with the M1 chip, but is not delivering a payload.
Recent ESET research shows a staggering increase in the number of attacks against Remote Desktop Protocol in 2020--a clear sign of how effective the method is when breaching networks and compromising machines.
Microsoft said the SolarWinds hackers were able to view and download some source code components for Azure, Exchange, and Intune.
The White House promised to make cybersecurity a top priority and in its first month has begun responding to the massive SolarWinds hack and appointed several people with national security experience who have also previously worked on cybersecurity issues to the Biden Administration.
The Public Interest Registry launched the DNS Abuse Institute to coordinate efforts by domain registrars and internet registries to stomp out abuses of the domain name system.
The U.S. Department of Justice has indicted three North Koreans for allegedly hacking banks, private companies, and government agencies for many years.
Thanks to all the data breaches and security incidents over the last few years, attackers are sitting on a gold mine of valuable credentials information which they can use to launch credential-stuffing attacks against major Web services and other applications.
The volume of attacks using web shells as a persistence mechanism has nearly doubled in recent months, Microsoft said.
Proofpoint and Facebook are in court fighting over how to handle the problem of domains that impersonate well-known brands, highlighting the difficulty in differentiating malicious activity and security awareness.
Neil Daswani, co-director of the advanced security program at Stanford University and a former engineer at Twitter and Google, joins Dennis Fisher to discuss his new book, Big Breaches: Cybersecurity Lessons for Everyone, and the common root causes and effects of major data breaches.
The nature of modern software development is that development teams have to rely on "blind trust" for some of the code components written by someone else. A new attack method showed how build systems could be tricked into pulling code from the wrong projects.
National security experts and policy makers say the U.S. needs to act now to raise the cost of doing business for state-backed attackers.