Google's Threat Analysis Group has exposed a new exploit framework called Heliconia that may have been used to exploit zero days in Chrome, Firefox, and Windows.
A newly discovered cyber espionage campaign from a Chinese threat actor is targeting Asian and US organizations with self-replicating malware called MISTCLOAK.
Google has updated Chrome on the desktop and Android to address a zero day that is being exploited in the wild.
Researchers warn that the usage of the discontinued Boa web server is opening up SDKs and Internet of Things devices to attack.
The inherent complexity, speed and secrecy across the acquisitions process makes this landscape particularly lucrative for threat actors.
Dan Lorenc discusses the rise of software supply chain security threats, the value of accurate asset inventory, and how companies are addressing these challenges.
Researchers warn that a stealthy callback phishing attack has been targeting the legal and retail sectors with the end goal of stealing data for extortion.
The Hive ransomware has victimized 1,300 companies globally as of November, in particular targeting healthcare sector organizations, according to U.S. federal agencies in a new advisory.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
New variants of the RAT reveal added functionalities and deployment alongside other malware families.
Rapid7 researchers discovered two code execution flaws in several versions of the F5 BIG-IP appliances.
Hundreds of thousands of email distributing Emotet reveal significant changes to the malware's tactics and payloads.
Dan Lorenc, CEO and founder of Chainguard, joins Dennis Fisher to talk about supply chain security, asset inventory, Sigstore, and the challenges of helping developers write more secure code.
A watchdog report highlighted weaknesses in the Department of Defense's cyber incident reporting procedures, particularly for the critical defense industrial base sector.
Attackers are focusing their attention on critical infrastructure operators, and building resilience into those networks is a key to defending them, experts say.