Decipher Library: Holiday Edition 2023
Our annual holiday book recommendation guide is here to help you discover what to read during your holiday downtime.
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Our annual holiday book recommendation guide is here to help you discover what to read during your holiday downtime.
Merritt Baer, field CISO at Lacework and former member of the AWS office of the CISO, joins Lindsey O'Donnel-Welch in this week's
The Government Accountability Office found that various federal agencies don't have a comprehensive way to track cybercrime data,
The U.S. government is ramping up its pressure on North Korea-linked malicious cyber activity after a $600 million crypto-heist that was linked recently to the Lazarus Group.
Threat groups are getting better at scaling out operations through affiliate relationships and partnerships.
Researchers observed a "very messy attack" on a regional U.S. government agency where attackers lurked in the network for at least five months before ransomware was deployed.
The previously discovered RCE flaw in the Spring framework is being leveraged by attackers to deploy the Mirai botnet malware.
The Conti leaks show how threat groups have refined the process of building out their resources, talent and infrastructure.