In order to get critical infrastructure cybersecurity regulations right, regulators need to focus on risk reduction and performance outcomes rather than prescriptive measures, according to a panel at Hack the Capitol 6.0.
Various threat groups are increasingly using Babuk’s leaked source code to build ESXi lockers, including a never-before-seen Linux version of the Play ransomware.
A new phishing service called Greatness is targeting Office 365 organizations in the U.S. and elsewhere.
A known ransomware group was able to access limited information resources, which it then attempted to use in an unsuccessful extortion attempt against the company.
While Operation Medusa disrupts long standing espionage efforts by Turla, security researchers say that its effects will only be temporary.
GitHub has released a new push protection feature to prevent developers from accidentally including secrets in commits.
Researchers have discovered the firmware signing keys and Intel BootGuard keys for several manufacturers in data dumped by attackers who breached Taiwanese hardware maker MSI.
Microsoft has patched two flaws (CVE-2023-29336 and CVE-2023-24932) that have been actively exploited.
Lucia Milica, global resident CISO at Proofpoint, discusses the top takeaways from the 2023 Voice of the CISO report.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
The ransomware task force said in their latest progress report that private sector organizations, governments and cryptocurrency entities need to work together more in swapping information about cyber incidents.
A recent APT campaign shows how threat actors are adding complexity to the decade-old attack.
The newest version of the EARNT IT Act still has language that would force platform providers to weaken or abandon encrypted services.
The new malware was found stealing saved usernames and passwords in browsers in order to compromise business Gmail, Outlook and Facebook accounts.
Decipher talks to Dawn Cappelli, director of OT-CERT at Dragos, about the challenges of securing operational technology, particularly for organizations with limited budget and resources.