The FBI and partners have released an advisory highlighting TTPs and IoCs for APT28 threat actors in attacks against Ubiquiti EdgeRouters.
Alex Delamotte, threat researcher at SentinelLabs, talks about the importance of actionable threat intelligence, how threat actors are leveraging cloud services, and the upcoming Net Gala, a hacker and tech-themed art exhibition.
CISA and some its foreign partner agencies are warning that APT29 is using a variety of techniques to target cloud services and accounts.
Change Healthcare on Monday continued to work through disruptions to its systems after an attack by nation-state threat actors.
While law enforcement disruptions certainly have a positive impact, there are deep-rooted difficulties in measuring substantial long-term changes.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
The ConnectWise ScreeConnect authentication vulnerability disclosed this week is now under active exploitation and there is proof-of-concept exploit code available.
Jennifer Leggio, a longtime security industry executive who has served in many different roles, joins Dennis Fisher to talk about the shift in thinking among those in the security community, technical gatekeeping in security, her new consulting venture Moveable Feast, and finding your niche.
The breadth of the takedown itself is multifaceted and impacts everything from LockBit’s infrastructure backbone to members’ ability to access cryptocurrency accounts linked to the ransomware group.
Dennis Fisher and Lindsey O'Donnell-Welch discuss the disruption of the LockBit ransomware operation by the FBI, Europol, and UK authorities, what it means for victims, and how it fits into the government's larger strategy to target cybercrime groups.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
The operation marks the latest effort by U.S. law enforcement to knock down malicious cyber operations.
Microsoft fixed the flaw as part of its regularly scheduled updates on Tuesday.
A new study shows that more than 70 percent of organizations have applications with vulnerabilities that are more than a year old, and nearly 50 percent have critical bugs that old.
The campaign uses a slightly modified attack chain for Bumblebee and marks the return of the malware after a four-month absence from the threat landscape.