The Lazarus Group has been compromising vulnerable IIS servers in an ongoing campaign.
The Apple vulnerabilities (CVE-2023-32409, CVE-2023-28204 and CVE-2023-32373) exist in WebKit.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
Researchers said that it "is difficult to measure" the potential long-term impact of TurkoRat infections on developer systems.
Researchers warn that a Go-based implementation of Cobalt Strike beacons, called "Geacon," is lucrative for threat actors in attacks targeting macOS.
In a new advisory, the FBI and CISA warn that the BianLian ransomware group has moved to a data theft and extortion model.
The Russian national allegedly used three well-known ransomware variants - LockBit, Babuk and Hive - to target critical infrastructure victims.
An UNC3944 attack highlights how threat actors can abuse legitimate cloud resources for various purposes after compromising the Azure administrator's account.
A Chinese state-affiliated attack group known as Camaro Dragon is targeting some TP-Link routers to install malicious firmware images.
A "powerful" backdoor has been uncovered in highly targeted, intel-gathering APT attacks.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
CISA warned that a ransomware group exploited vulnerable PaperCut servers in May in order to target the education facilities subsector.
In order to get critical infrastructure cybersecurity regulations right, regulators need to focus on risk reduction and performance outcomes rather than prescriptive measures, according to a panel at Hack the Capitol 6.0.
Various threat groups are increasingly using Babuk’s leaked source code to build ESXi lockers, including a never-before-seen Linux version of the Play ransomware.
A new phishing service called Greatness is targeting Office 365 organizations in the U.S. and elsewhere.