Decipher Library: Holiday Edition 2023
Our annual holiday book recommendation guide is here to help you discover what to read during your holiday downtime.
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Our annual holiday book recommendation guide is here to help you discover what to read during your holiday downtime.
Merritt Baer, field CISO at Lacework and former member of the AWS office of the CISO, joins Lindsey O'Donnel-Welch in this week's
The Government Accountability Office found that various federal agencies don't have a comprehensive way to track cybercrime data,
The attack framework's C2 is freely available and its implants contain various credential theft capabilities.
The Qakbot emails show the long tail of exploitation efforts against the Microsoft ProxyLogon flaw.
Welcome to Source Code: Decipher's behind-the-scenes look at the weekly news with input from our sources.
Researchers urged impacted organizations to “take steps immediately to mitigate the vulnerability" in Atlassian's Confluence Server and Data Center.
Microsoft exposed an Austria-based private-sector offensive actor that has been observed both selling the Subzero malware to third parties, but also using its own infrastructure in some attacks.