APT42 is creative in its social engineering efforts and steals credentials and MFA authentication codes in order to compromise targets and conduct espionage.
Meg Gardiner recently joined Dennis Fisher on the Decipher podcast to talk about the hacking and security aspects of her new novel, Heat 2.
The U.S. government security advisory comes the same week that the Los Angeles Unified School District, the second-largest U.S. school district, said it was hit by ransomware.
The control panels show how TA505 is “highly proactive” in updating its malware and has the ability to run multiple malware campaigns at the same time.
Google has released an emergency update for Chrome to fix a vulnerability (CVE-2022-3075) that has been actively exploited.
Dennis Fisher talks with Meg Gardiner, the coauthor of Heat 2, the bestselling sequel and prequel to Heat, the greatest crime movie ever made. They discuss the infosec and hacking subplot of the novel, where that idea came from, and how the research into the hacking scene worked.
Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.
CISA is warning customers about several locally exploitable flaws in Contec Health CMS8000 devices.
Microsoft quietly fixed the elevation of privilege flaw in June.
Apple has released an update for older iOS devices and iPhones to address an actively exploited WebKit zero day (CVE-2022-32893).
Google will reward the discoveries of flaws found in its open source software projects, such as Golang, Angular and Fuchsia.
The group activity has overlaps with APT40, which has continued its “operational tempo” despite a previous indictment by the U.S. Department of Justice in 2021.
The lawsuit against data broker Kochava is another step by the FTC to crack down on invasive data collection and sharing practices.
An attacker was able to compromise a developer account and steal a portion of the LastPass source code recently, the company said. But no customer data was affected.
The PyPI maintainers say a new phishing campaign is targeting Python project maintainers and aiming to steal credentials and compromise projects.