Criminals Hosting Phishing Kits on GitHub
The DNSpionage attack group is now using a new backdoor called Karkoff, which may have ties to the OilRig leaks as well.
Users who hate having to change their Windows passwords every 60 days can rejoice: Microsoft now agrees that there is no point to forced password changes and will be removing that recommendation from its security recommendations.
BEC scams continue to rise and accounted for $1.2 billion in losses in 2018. The good news is that the FBI was able to work with banks to recover some of the funds.
“Bug bounty apostate” and Luta Security founder Katie Moussouris said bug bounty programs have veered away from their original mission: help organizations become more secure.
A series of targeted phishing campaigns have hit victims in government finance agencies and embassies in several European and African countries.
Google is planning to block sign-in attempts from embedded browser frameworks soon to help defeat some phishing attacks.
An unknown leaker is publishing hacking tools used by the APT34 attack group that has been linked to Iranian intelligence.
The endpoint is still the most important part of enterprise defense, but Absolute Software's analysis found that throwing more security agents at an endpoint doesn’t make the system more secure.
Dennis Fisher talks with Craig Williams of Cisco Talos about the Sea Turtle DNS-hijacking campaigns.
A group of attackers has been running a DNS hijacking campaign known as Sea Turtle that targets energy, intelligence, and military organizations.
Security professionals struggling with securely configuring Windows 10 devices can look at Microsoft's new security configuration framework.
Wordfence researchers are "confident" the same actor is responsible for a wave of attacks that have hit thousands of WordPress sites over the past month by targeting vulnerabilities in WordPress plugins.
Google has turned on support for the MTA-STS security standard in Gmail, providing better transport security for domain owners.
Supply chain attacks are scary, but there are plenty of other hardware-based issues organizations should be worrying about before they have to panic about the complex malicious implants in their servers.