The Supreme Court's decision in the Van Buren case has narrowed the interpretation of the Computer Fraud and Abuse Act, providing more leeway for security research.
Improving the security of the open source software supply chain will require better understanding of dependencies, and cooperation from developers and users.
Dennis Fisher, Zoe Lindsey, and Pete Baker ride a cart through the steam tunnels to meet at the Pacific Tech lab, crank up the laser, and ponder the immortal words of Socrates, who said, "I drank what?" Get your giant tinfoil ball of popcorn ready for Real Genius!
The ENCRPYT Act reintroduced in the House of Representatives last week would prevent states from passing laws to weaken or ban encryption.
The Department of Justice seized two domains used in the Nobelium spear-phishing campaign that impersonated the United States Agency for International Development.
A phishing campaign by the Russian actor known as Nobelium impersonated the United States Agency for International Development while targeting government agencies and humanitarian groups.
Two Chinese cyberespionage groups are targeting flaws in Pulse Secure VPN devices to compromise government and private networks in the U.S. and Europe.
The requirement for vendors to provide a software bill of materials for the apps they sell to federal agencies will only address part of the supply chain risk, experts say.
Researchers uncovered a flaw in macOS that could allow attackers to access permissions, like screen recording, on victim devices - without their approval.
VmWare has released updates for a critical flaw in several versions of its vCenter Server virtualization product that can be used for remote code execution.
As demand for cyber insurance skyrockets, insurers are scrutinizing specific security risk factors more carefully when determining the cost and affordability of coverage.
The shutdown of the DarkSide ransomware group has affiliates seeking resolution for unpaid ransom fees.
Lindsey O'Donnell-Welch talks with Troy Hunt, founder of Have I Been Pwned, about the biggest challenges facing the security industry when it comes to credential stuffing and data breaches.
Decade-old botnets continue to adapt to the current threat landscape, as seen through the wide-ranging malicious activities of the resilient Phorpiex botnet.
Kimberly Goody of the FireEye cyber crime analysis team explains the ransomware-as-a-service model and the recent changes some groups have made to their operations.