GitLab has patched a critical vulnerability caused by hardcoded passwords in several versions.
Ransomware attacks on local governments over the past year have resulted in various public service disturbances, from disabling jail surveillance cameras to disrupting COVID-19 vaccination appointment scheduling.
After investigating the Deep Panda APT's recent exploitation attempts of the Log4j flaw, researchers uncovered a new kernel rootkit.
A remote code execution flaw in the Spring Java framework has been uncovered, and exploits are circulating in some places.
A widespread, international crackdown on business email compromise resulted in the arrest of 65 suspects.
CISA is warning enterprises about ongoing attacks against Internet-connected UPS devices and encouraging them to change default credentials and enforce MFA.
Caitlin Condon, vulnerability research manager at Rapid7, talks about the rise of “widespread threats,” how the time to exploitation by attackers has shifted and what that means for security teams.
U.S. election officials and other state and local government officials received invoice-themed phishing emails aiming to steal their credentials, warned the FBI.
Attackers are using compromised Microsoft Exchange servers to launch thread-hijacking attacks that infect victims with the IcedID malware.
Google has patched a zero day in the V8 engine in Chrome that is under active attack.
This week's Source Code podcast by Decipher takes a look behind the scenes at top news with input from our sources.
A recent campaign targeted Azure developers with malicious npm packages designed to look like legitimate tools.
Google researchers have detailed campaigns by two North Korean government-backed groups that exploited a now-fixed Chrome flaw to target organizations across various industries.
The U.S. has indicted four Russians it alleges are affiliated with the FSB and GRU units responsible for the Triton and Dragonfly attacks against critical infrastructure in the United States and abroad.
The Lapsus$ group, which most recently claimed breaches of Microsoft and Okta, relies on several tactics used less frequently by other threat groups.