There are multiple distinct banking Trojan families in Latin America, rather than one large group as has been previously believed, ESET researchers said at the Virus Bulletin 2020 conference.
GitHub has released a new code-scanning feature for both public and private repositories that finds security flaws before they make it into a codebase.
Larry Cashdollar, a senior security researcher at Akamai, joins Dennis Fisher to talk about 20 years of vulnerability research and the many different ways that things can go sideways.
A security incident at Universal Health Services has taken the network of the large health system offline.
Organizations are increasingly developing incident response playbooks to plan out in advance what steps to take in case of a security breach—such as an employees accessing files without authorization, a lost computer, or a server compromised by outside attackers. A team of academics from the UK's University of Kent and University of Warwick outlined a comprehensive playbook on how organizations should communicate after a security incident.
The Zerologon vulnerability Microsoft patched in Windows Server last month is actively being exploited in several attacks, Microsoft warned.
An intruder breached a federal agency’s internal network and accessed data files using compromised credentials and custom malware, the Cybersecurity and Infrastructure Security Agency said in an Analysis Report.
CISA alerted administrators that activity from the LokiBot information stealing trojan has been increasingly sharply since July.
The SAFE DATA Act is the latest attempt to pass a national privacy law, but it relies on notice-and-consent and does not apply to federal agencies.
Federal agencies have until the end of Monday to install fixes for a recently-fixed elevation of privilege vulnerability in Windows which could be used to take control of the entire network, CISA said in an emergency directive.
MITRE’s latest project is a public library of detailed plans replicating tactics and techniques used by known attack groups. The first set of adversary emulation plans released this week describe the behavior of cybercrime group FIN6.
A large coalition of privacy and civil liberty groups have sent a letter urging senators to oppose the EARN IT Act.
The Department of Justice has charged five men with hacking offenses in connection with operations by the APT41 group from China.
The House of Representatives has unanimously passed a bipartisan bill setting minimum security requirements for Internet of Things devices connected to federal networks. The next step: get the Senate to vote on its version of the bill.
CISA says attackers affiliated with China's Ministry of State Security have been targeting public vulnerabilities in VPN appliances and F5 networking gear.