Security news that informs and inspires
scrambled headshot of Lindsey O’Donnell-Welch

Lindsey O’Donnell-Welch

Executive Editor

Lindsey O’Donnell-Welch is an award-winning journalist who strives to shed light on how security issues impact not only businesses and defenders on the front line, but also the daily lives of consumers.

In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.

  • lindsey@decipher.sc

Featured Articles

127 articles by Lindsey O’Donnell-Welch

Attackers Target European Industrial Firms With Cring Ransomware

Attackers exploited a previously-disclosed flaw in Fortinet VPN servers in order to hit European industrial firms with the Cring ransomware.

Ransomware, Cring Ransomware, Attacker, Vulnerability

Apple Details Crackdown Efforts On Invasive Ad Tracking

Apple said its App Tracking Transparency rules will restrict advertisers’ abilities to track user behavior, while still giving them the option to analyze the impact of their ads.

Apple, Mobile, Mobile Apps, Privacy

Ongoing Attacks Target SAP Flaws, Unsecured Accounts

Attackers are targeting SAP enterprise applications that have not been updated to address previously-fixed flaws, researchers warn.

Vulnerability, Vulnerabilities, Patch, Sap

U.S. Senators Press Ad Exchanges on Data Privacy

Senators pressure eight digital advertising exchanges - including Twitter, Google and AT&T - to disclose who is collecting what specific user data during the real-time bidding process.

Privacy, Government, Government Agencies, Data Privacy

Kansas Water Utility Attack Underscores Security Limitations in Municipalities

An indictment this week resulting from a 2019 intrusion at a Kansas water utility highlights the budgetary and technical limitations utilities face.

Ics Security