Security news that informs and inspires

All Articles

2376 articles:

Revamped Anchor Malware Targets Windows Systems

Researchers believe that attackers behind the Anchor malware, the Trickbot gang, have ceased Trickbot operations are instead focusing on deploying stealthier versions of other malware families.

Malware, Windows, Trickbot

Decipher Podcast: Source Code 2/25

Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.

Source Code, Podcast

Cuba Ransomware Exploits Microsoft Exchange Flaws

Ransomware actors have increasingly shifted their tactics to exploit flaws as part of their initial infection vector.

Ransomware, Microsoft Exchange, Proxyshell

CISA Warns of Ongoing Attacks by MuddyWater APT

U.S. agencies are warning that the Iranian-backed APT group MuddyWater is targeting organizations in many industries in North America and elsewhere.

Malware, Iran

Wiper Malware Hits Organizations in Ukraine

Researchers observed wiper malware and DDoS attacks impacting organizations in Ukraine this week.

Malware, Cyberattack

Dridex Malware Spreads Entropy Ransomware In Recent Cyberattacks

Researchers point to a possible common origin between the Dridex malware and Entropy ransomware due to code similarities.

Malware, Ransomware

Sandworm Group Deploying New Cyclops Blink Malware

The Russian Sandworm threat actor has been deploying a new piece of malware called Cyclops Blink, warns CISA and NSA.

Malware, Russia

Decipher Podcast: Nitin Natarajan

Nitin Natarajan, deputy director for the Cybersecurity and Infrastructure Security Agency (CISA), talks about how the agency is tackling various emerging security challenges more effectively.

Podcast, CISA

GitHub Opens Up Security Advisory Database

GitHub is opening is security Advisory Database to contributions to the community, allowing new research and improvements to help secure the software supply chain.

Github

Hybrid Workforces Face Unique Phishing Challenges

Phishing attacks have increased across the board over the past year as companies continue to grapple with unique remote and hybrid work environment challenges.

Phishing, Remote Work

IRS Facial Recognition Backlash Highlights Broader Privacy Concerns

Facial recognition technology is coming under fire for privacy concerns around how biometrics data is collected, stored and used.

Facial Recognition, Privacy

Decipher Podcast: Source Code 2/18

Welcome back to Source Code, Decipher’s weekly news podcast with input from our sources.

Podcast, Source Code

New FBI Unit Will Focus on Cryptocurrency Exploitation

The FBI is forming a new Virtual Asset Exploitation unit to trace cryptocurrency crimes and ransomware profits.

Government, Ransomware

Threat Actor Exploits Log4j Flaw in VMware Horizon

Researchers said an Iran-linked threat actor was exploiting the Log4j vulnerability in order to deploy backdoors, harvest credentials and other malicious activities.

Log4j, Vmware

CISA Orders Federal Agencies to Patch Exploited Google, Adobe Flaws

Federal agencies have until March 1 to fix a pair of actively exploited flaws in Google Chrome and Adobe's Commerce and Magento platforms.

CISA, Google, Google Chrome, Zero Day