The U.S. government is upping its efforts to track down members of the DarkSide cybercrime group, which was behind the May ransomware attack on the Colonial Pipeline.
An emerging threat called Tortilla has been exploiting vulnerabilities in Microsoft (MS) Exchange servers hit with Babuk ransomware.
Welcome to Source Code: Decipher’s new behind the scenes look at the weekly news with input from our sources. Topping the headlines this week are two key cybersecurity-related moves by the U.S. government. These include the government blocking exports to NSO Group, Positive Technologies and other companies, and creating a catalog of known, actively exploited vulnerabilities that federal agencies must address. In other news, researchers have uncovered a threat group targeting vulnerable Microsoft Exchange servers with ransomware. A new report also shed light on various network access brokers selling credentials that they claimed belonged to logistics companies.
The BlackMatter ransomware group says it is closing up shop after pressure from authorities and the disappearance of some members.
Under a new binding operational directive (BOD), CISA has developed a catalog of known, exploited vulnerabilities that federal agencies must address.
The Commerce Department added NSO Group, Candiru, Positive Technologies, and COSEINC to its Entity List, restricting exports of software and hardware to them.
Cybercriminals claim they have access to various shipping and logistics company networks, causing what researchers say could be a “precarious situation” for the struggling supply chain sector.
Mozilla has added site isolation to Firefox 94 to defend against side-channel attacks such as Spectre and Meltdown.
The two zero-day flaws were part of eight vulnerabilities patched this week in Google Chrome.
A task force of European and U.S. agencies arrested 12 suspects in Switzerland and Ukraine as part of an action against a ransomware operation.
Apple has fixed more than 20 vulnerabilities in iOS 15.1 and macOS Monterey 12.01.
The FTC has made changes to the Safeguards Rule aimed at securing consumer data in the financial industry.
The Lazarus group has been recently observed “building supply-chain attack capabilities” by targeting a legitimate South Korean security software and an IT asset monitoring solution vendor.
Researchers shed light on a malware loader that's been spotted consistently being spread via email spam messages over the past month.
New data from Microsoft shows that Nobelium, Thallium, and other nation-state attack groups are increasingly focusing on government agencies and NGOs.