Microsoft said that the threat group has used phishing and password-spraying attacks to compromise at least 14 IT service providers this year.
Courtney Nash of Verica joins Dennis Fisher to talk about the new Verica Open Incident Database, which centralizes reports of software outages, security incidents, and near misses, and why studying the way systems fail is so valuable.
Didier Stevens has discovered several shared keypairs used by rogue Cobalt Strike implementations used by malicious actors.
Microsoft researchers said TodayZoo, used for a massive campaign aimed at stealing victims’ credentials, was pieced together from an old phishing kit template.
A newly proposed interim final rule is the result of 2017 negotiations as part of the Wassenaar Arrangement after initial export rules were met with criticism.
Google researchers point to a resurgence in a decades-old session hijacking tactic, as seen in a recent phishing campaign.
A new email hijacking campaign by the TA551 attack group is installing the legitimate Sliver red-team tool as a payload, possibly for use in future ransomware operations.
Mandiant threat intelligence researchers give Decipher editor Lindsey O'Donnell-Welch a behind-the-scenes look at how they began tracking recently discovered ransomware group FIN12 - and what's next for the group.
A well-known attack group has compromised at least 13 telecommunications organizations since 2019, relying on custom toolsets and a novel C2 persistence method.
The BlackMatter ransomware operators are targeting critical infrastructure operators in the U.S., including food suppliers.
A Financial Crimes Enforcement Network (FinCEN) report showed cybercriminals switching up their money laundering efforts, in order to avoid detection by law enforcement.
Ransomware actors hist three wastewater facilities in the U.S. in the last few months, accessing SCADA devices and disrupting operations, CISA said.
The Verica Open Incident Database (VOID) provides a collection of reports on software outages, security incidents, and near misses to enable analysis of common causes and resolutions.
A slew of ransomware attacks is causing government officials to consider the resources needed to secure school district networks.
APT35 attackers are using a new technique in their phishing attacks, which leverages a function from Telegram.