Apple is warning about two zero days in macOS and iOS that are under active attack.
Microsoft, Fortra, and the Health-ISAC have obtained a court order to disrupt the use of cracked copies of Cobalt Strike, which are often used in ransomware intrusions.
Mike Hanley, CSO and SVP of engineering at GitHub, joins Dennis Fisher to talk about the company's move to enforce 2FA for all developers, the changing role of the CISO, and what's ahead for software supply chain security.
U.S. law enforcement authorities have taken down the Genesis Market darknet marketplace, which sold stolen data and initial access.
Google's elite Threat Analysis Group has revealed more details of the North Korean APT43 group, which is refers to as Archipelago.
A backdoor named Gopuram used by the Lazarus Group has been found in a small number of environments compromised in the 3CX supply chain attack.
The supply chain attack against 3CX may have been planned for more than a year, and such intrusions are the best return on investment for attackers, researchers say.
The Winter Vivern APT group is now targeting government agencies and diplomats from the United States and European countries.
Two versions of the 3CX Windows electron app were compromised in a targeted supply chain attack, and researchers have connected it to a North Korean attack group.
Researchers at Google and Amnesty International have found new spyware campaigns that exploited multiple iOS, Android, and Linux zero days.
Apple has patched a zero day in WebKit that has been exploited in the wild, as well as a serious security bypass bug in macOS.
Two threat groups have been identified deploying a new variant of the IcedID malware, which often is seen in conjunction with Emotet.
A Chinese APT team has targeted telecom providers in the Middle East with a campaign that may be lined to the Operation Soft Cell actors.
A previously unknown APT is targeting Ukrainian government agencies with malware known as PowerMagic and CommonMagic.
Version 8 of libcurl has been released, patching six vulnerabilities, including an authentication bypass.