In Chrome 127, Google has enabled a feature called app-bound encryption to protect cookies from malware.
Huntress security researchers John Hammond joins Dennis Fisher to discuss the continued fallout from the CrowdStrike outage on cybersecurity teams.
UNC4393, a top Basta ransomware operator, has switched its initial access vector, showing the ongoing influences in the threat landscape a year after the Qakbot malware takedown.
The VMware ESXi flaw gives threat actors full administrative permissions on domain-joined hypervisors.
The Department of Justice has indicted Rim Jong Hyok for allegedly conducting Maui ransomware attacks as part of the APT45 group.
Tyler Healy, CISO of Digital Ocean, joins Dennis Fisher to discuss the unique challenges of defending a huge platform, how AI is changing things for defenders, and what new challenges AI might bring in the near future.
Mandiant researchers have graduated a North Korean threat group to APT45 and the FBI is warning about the group's focus on stealing sensitive data from military and critical infrastructure operators.
The CrowdStrike Falcon update issue has become an attractive lure for cybercrime groups as affected organizations continue work to recover from the outage.
A known APT espionage group known as Daggerfly has updated its toolset in a number of recent attacks against organizations in Taiwan, as well as a U.S. non-governmental organization in China.
In a Friday statement, CISA said that it has observed threat actors taking advantage of the massive global outages, linked to a faulty CrowdStrike update, for phishing “and other malicious activity.”
An issue with an update for CrowdStrike's Falcon sensor software has caused Windows machines to fail and is linked to Microsoft Azure outages around the world.
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as AvNeutralizer for many years. SentinelOne researchers Antonio Cocomazzi helps us dig into the group's tactics and tools.
APT41 compromised multiple organizations in the shipping and logistics, media, technology and automotive sectors.
Former NSA Deputy Director George Barnes joins Dennis Fisher to talk about his 35-year career at the agency, how he came to be intrigued by the cybersecurity world, the emergence of Cyber Command as a force inside the government, and what he sees as the priorities for defenders now.
Members of the U.S. Senate Subcommittee on Privacy, Technology and the Law asked AT&T’s CEO “about how AT&T failed to protect such profoundly sensitive information from cybercriminals.”