The Cat and Mouse Game of Crypto Money Laundering
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
Despite the U.S. government adopting many recommendations by the Ransomware Task Force in combating ransomware, authorities...
Government officials cited progress a year after Biden's executive order, but stressed that "there's more work to do."
Phishing attacks have increased across the board over the past year as companies continue to grapple with unique remote and hybrid work environment challenges.
Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.
Facial recognition technology is coming under fire for privacy concerns around how biometrics data is collected, stored and used.
Researchers said an Iran-linked threat actor was exploiting the Log4j vulnerability in order to deploy backdoors, harvest credentials and other malicious activities.
Federal agencies have until March 1 to fix a pair of actively exploited flaws in Google Chrome and Adobe's Commerce and Magento platforms.