The Better Cybercrime Metrics Act aims to help streamline the consistent reporting of cybercrime incidents.
This week's Source Code podcast by Decipher takes a look behind the scenes at top news with input from our sources.
The malware framework contains a loader, dropper and a remote access trojan with its own network communication protocol.
GitHub will require 2FA for all users who contribute code on the platform by the end of 2023.
Lindsey O'Donnell-Welch speaks with Jonathan Reiber, vice president, Cybersecurity Strategy and Policy at AttackIQ.
A newly discovered suspected espionage threat actor is targeting companies that focus on corporate development, mergers and acquisitions and large corporate transactions.
Several versions of curl and the curl library contain a pair of security flaws.
A $23.5 million phishing scheme was carried out in 2018 that impacted the U.S. Department of Defense.
Overall, the proposed fiscal year 2023 budget represents an 18 percent increase over the requested budget for fiscal year 2022, reflecting a "significantly increased investment" in CISA.
This week's Source Code podcast by Decipher takes a look behind the scenes at top news with input from our sources.
Researchers speculate that the emerging loader is a replacement for the BazaLoader malware.
Many of the top ransomware groups in 2021 have disappeared, while several new groups have emerged with high levels of activity.
The ProxyShell, Log4J, and Zerologon bugs were among the most commonly exploited ones in 2021, according to a new advisory from the NSA and other agencies.
Don Smith of the Secureworks CTU joins Dennis Fisher to discuss the effects of the Conti leaks, the ransomware landscape, and how law enforcement and researchers are countering attackers' ploys.
Sophisticated threat groups started closing in on the VMware remote code execution flaw a week after a patch was deployed.