SEO-friendly websites promising Zoom or TeamViewer application installations are actually attacker-owned and deploy malware.
Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.
The board, tasked with identifying and sharing lessons learned from “significant cybersecurity events," will first assess the Log4j logging library flaw.
A Samba bug could allow remote attackers without authentication to execute arbitrary code as root on impacted systems.
The new Alpha-Omega Project from the Open Source Security Foundation will offer technical and financial assistance to open source maintainers to help them find and fix security flaws.
Privacy experts pinpoint the challenges and complexities behind a federal data privacy law.
Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.
Jon Callas, director of technology projects with EFF, talks about invasive data tracking and surveillance during the pandemic.
The source code's release on GitHub can potentially mean future attacks on IoT devices and routers, warn researchers.
Developing good communication and storytelling skills can be a vital career step for cyber threat intelligence professionals.
A local privilege escalation bug in the Polkit Linux component could allow an attacker to gain root privileges with a simple exploit.
The White House has outlined a number of cybersecurity measures that federal agencies must adopt - as part of an overall zero-trust strategy - though it acknowledges that the transition "will not be a quick or easy task."
Timo Steffens, private security researcher and author of Attribution of Advanced Persistent Threats, discusses some of the top roadblocks that researchers face during attribution.
Researchers found an announcement on an underground forum for LockBit Linux-ESXi Locker version 1.0 in October.
Three remote code execution bugs in the PrinterLogic platform have been patched. The bugs could allow an attacker to run arbitrary code on any connected endpoint.