Security news that informs and inspires

All Articles

2349 articles:

Iranian Threat Groups Spread Cyberattack Fears Through Influence Operations

Iranian threat groups are launching cyberattacks - or in some cases saying they are - and then sowing fear around the hacks through online influence operations.

Iran, APT

Apple, Google Develop Specification to Address Unwanted Bluetooth Tracking

Apple and Google have submitted a draft IETF specification to alert users when they are being tracked by Bluetooth accessories such as AirTags.

Privacy, Apple, Google

Google Enables Passkeys for Account Login

Google is enabling passkeys as a login method for all accounts as part of its effort to move users away from passwords to more secure authentication methods.

Google, Passwords

NIST Cybersecurity Framework Gets ‘Significant Update’

The cybersecurity framework is getting an overhaul as NIST aims to better incorporate supply chain risk management and governance.

Nist, Government, Governance

Network Security Needs to Evolve as Quickly as Threats

Enterprise networks have evolved rapidly in recent years, but the security industry hasn't been as agile and is not keeping up with the pace of change.

RSA, Cloud Security

CISOs Navigate Legal Risks After Former Uber Executive’s Conviction

High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents at organizations.

CISO, Ciso Concerns

Decipher Podcast: Source Code RSA Conference Edition

This week at the RSA Conference, software supply-chain security, CISO liabilities and public-private sector partnerships were some of the key topics.

Podcast, Source Code

PaperCut Flaws Exploited to Deploy Clop, LockBit Ransomware

Microsoft has attributed exploitation attempts of CVE-2023-27350 and CVE-2023-27351 to a Clop ransomware affiliate.

Ransomware, Lockbit, Clop, Microsoft

Google Disrupts Massive CryptBot Malware Operation

A new court order allows Google to take down current and future domains tied to the distribution of the CryptBot infostealer.

Malware

Software Supply Chain Security: ‘An Everybody Problem’

At the RSA Conference this week, government officials and cybersecurity executives mulled over the multiple layers of challenges in securing the software supply chain.

Software Security, Supply Chain Security, RSA Conference

Decipher Podcast: Chris Wysopal and Cris Thomas

Chris Wysopal and Cris Thomas of the L0pht join Dennis Fisher to talk about the 25-year-anniversary of the group's landmark Senate testimony, what's changed since then, and Cris's new book, How the Hackers Known as L0pht Changed the World.

Podcast

International Cooperation Key to Ransomware Fight

Top cybersecurity officials from the U.S., U.K., and other allies say international cooperation among intelligence and law enforcement agencies has been a key factor in successful operations against ransomware groups.

RSA, Government, Ransomware

Mirai Botnet Attackers Exploit TP-Link Router Bug

Researchers began to detect exploit attempts in the wild targeting the patched, high-severity flaw in TP-Link routers starting on April 11.

Mirai, Malware, Exploit

Iranian Hackers Blocked After Gaining Access to 2020 Municipal Election Infrastructure

Government officials talked about how agencies have partnered to address election security, the SolarWinds cyberattack and the Hafnium threat group's exploitation of Exchange servers.

Rsac, Solarwinds, Election Security

New MacOS Malware Emerges in North Korean APT Attacks

A new macOS malware, called "RustBucket," is used in a multi-stage attack.

Lazarus, North Korea