After Microsoft started blocking macros obtained from the internet by default, email attackers are exploring alternative techniques to distribute Emotet, Qakbot, IcedID and other payloads.
The U.S. government is offering monetary rewards for information about Conti's leaders, affiliates and operators.
Exploits for the critical F5 BIG-IP flaw (CVE-2022-1388) are now circulating online and malicious actors are scanning for it.
The Better Cybercrime Metrics Act aims to help streamline the consistent reporting of cybercrime incidents.
This week's Source Code podcast by Decipher takes a look behind the scenes at top news with input from our sources.
The malware framework contains a loader, dropper and a remote access trojan with its own network communication protocol.
GitHub will require 2FA for all users who contribute code on the platform by the end of 2023.
Lindsey O'Donnell-Welch speaks with Jonathan Reiber, vice president, Cybersecurity Strategy and Policy at AttackIQ.
A newly discovered suspected espionage threat actor is targeting companies that focus on corporate development, mergers and acquisitions and large corporate transactions.
Several versions of curl and the curl library contain a pair of security flaws.
A $23.5 million phishing scheme was carried out in 2018 that impacted the U.S. Department of Defense.
Overall, the proposed fiscal year 2023 budget represents an 18 percent increase over the requested budget for fiscal year 2022, reflecting a "significantly increased investment" in CISA.
This week's Source Code podcast by Decipher takes a look behind the scenes at top news with input from our sources.
Researchers speculate that the emerging loader is a replacement for the BazaLoader malware.
Many of the top ransomware groups in 2021 have disappeared, while several new groups have emerged with high levels of activity.