A key European Union Parliament committee has rejected proposed language that would allow for mass scanning of encrypted messages.
Microsoft released patches for 57 vulnerabilities in November's Patch Tuesday update, including three flaws that have been actively exploited.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
A path traversal zero day (CVE-2023-47246) in the SysAid on-premises product is under active attack by the ace Tempest threat group.
A new report revealed discrepancies in how CISOs and developers view their roles and responsibilities around software supply chain security.
Kymberlee Price, co-founder of Zatik, joins Dennis Fisher to talk about her experience running security response programs at Microsoft, BlackBerry, and other companies, and how the changing security landscape helped lead her to start her own company.
Researchers with IBM X-Force recently observed the new Gootloader variant being used for lateral movement, marking a significant change in the malware’s post-infection tactics.
Attackers are targeting the critical Atlassian Confluence flaw (CVE-2023-22518) with active exploit attempts, including some trying to deploy ransomware.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
Apache disclosed this flaw and released patches for it on Oct. 25, and proof-of-concept exploit code is also available for the bug.
Further details for the vulnerability were not specified, but the bug is rated 9.1 out of 10 on the CVSS v3 scale, and Atlassian is underscoring its potential impact for customers.
In the premier episode of Memory Safe, our new podcast and video series, Dennis Fisher talks with Michelle Finneran Dennedy, founder and CEO of Privacy Code, former CPO of Sun Microsystems and Cisco, and all around great person, about her early interest in technology, the influence of her father on her career, and why she's still doing security after all this time.
Federal agencies are being ordered to take a closer look at how AI could potentially impact areas like vulnerability discovery capabilities or critical infrastructure cyberattacks.
The critical-severity, unauthenticated remote code execution flaw exists in several versions of the F5 BIG-IP security appliances.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.