GAO: Federal Agencies Contend With Disparate Cybercrime Metrics
The Government Accountability Office found that various federal agencies don't have a comprehensive way to track cybercrime...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
The Government Accountability Office found that various federal agencies don't have a comprehensive way to track cybercrime...
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents...
Ransomware actors are getting better at laundering their proceeds from attacks - but law enforcement authorities are also...
The attack framework's C2 is freely available and its implants contain various credential theft capabilities.
The Qakbot emails show the long tail of exploitation efforts against the Microsoft ProxyLogon flaw.
Welcome to Source Code: Decipher's behind-the-scenes look at the weekly news with input from our sources.
Researchers urged impacted organizations to “take steps immediately to mitigate the vulnerability" in Atlassian's Confluence Server and Data Center.
Microsoft exposed an Austria-based private-sector offensive actor that has been observed both selling the Subzero malware to third parties, but also using its own infrastructure in some attacks.