CISOs Navigate Legal Risks After Former Uber Executive’s Conviction
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents...
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
Despite the U.S. government adopting many recommendations by the Ransomware Task Force in combating ransomware, authorities...
Researchers said that malicious Windows kernel drivers will continue to be used by sophisticated groups that have the skills and resources needed to develop such tools.
The Apple vulnerabilities (CVE-2023-32409, CVE-2023-28204 and CVE-2023-32373) exist in WebKit.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
Researchers said that it "is difficult to measure" the potential long-term impact of TurkoRat infections on developer systems.
Researchers warn that a Go-based implementation of Cobalt Strike beacons, called "Geacon," is lucrative for threat actors in attacks targeting macOS.