The MITRE Corporation has disclosed a breach impacting one of its collaborative networks used for research, development and prototyping.
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler (CVE-2022-38028) for several years.
Decipher’s Lindsey O’Donnell-Welch and Mandiant analysts Dan Black and Gabby Roncone reflect on the most pivotal moments from Sandworm over the last decade, from NotPetya to the Ukraine electric power grid attacks.
Welcome back to the Source Code podcast, Decipher’s weekly news wrap podcast with input from our sources.
Threat actors have been exploiting known vulnerabilities in open-source platform OpenMetadata in order to access Kubernetes workloads and use them for cryptomining.
In order to convince LastPass users to hand over their passwords, attackers used a mix of phone calls, phishing emails and a phishing page under the domain “help-lastpass[.]com,” which has since been taken down.
Europol and a collection of UK law enforcement agencies have disrupted the LabHost phishing platform, which targeted victims globally.
Cody Stokes, a security leader at Procellis Technology, joins Dennis Fisher to talk about his time in the Marine Corps, the challenges of breaking into the cybersecurity field, and the fulfillment he gets from helping to protect users.
Recent activity by the well-known Sandworm group - which researchers with Mandiant have started calling APT44 - relies on a mix of espionage efforts and hacktivist personas.
UnitedHealth Group reports that the Change Healthcare ransomware attack has had an $872 million financial hit on its business, so far.
Many versions of the PuTTY client have a weakness that can generate biased ECDSA nonces and enable an attacker to eventually recover private encryption keys.
CISA is warning of a customer data breach at Sisense, a provider of business data analytics platforms, but the details of the incident are scarce still.
The flaw is being exploited in the wild, and no patches will be available until Sunday.
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take various mitigation measures after Microsoft's compromise last year.
Microsoft has issued over 147 patches in its largest patch Tuesday release since 2017, including fixes for two actively exploited vulnerabilities.