Dennis Fisher talks with Peter Baker, the founding brand designer at Duo and the man behind the Decipher brand, about his design philosophy, the earliest days of Scio/Duo, why design matters in security, and the influence that positivity and usability has had on the industry.
Slowing or stopping the global ransomware threat will take cooperation among government, enterprises, and law enforcement.
Apple has fixed four zero days in WebKit for iOS, macOS, and Safari that were under active attack.
Dennis Fisher talks with Katie Moussouris, Rich Mogull, Kymberlee Price, and Thomas Ptacek about the unique and inspiring life and legacy of hacker Dan Kaminsky.
Government officials and technology experts call for more collaboration between the public and private sectors when it comes to securing industrial control system environments.
The high-severity Dell flaws could allow local attackers to gain kernel-mode privileges.
PulseSecure has released patches for several flaws in its Connect Secure VPN appliance, one of which has been used in active attacks for some time.
Cybercriminals have rewritten the Buer malware loader in the Rust programming language, in an attempt to avoid detection.
More than 25 memory allocation flaws have been discovered in real time operating systems from Google, Amazon, and many other vendors that are used in IoT devices.
Researchers shed light on the FiveHands ransomware, which was deployed after a threat group exploited a now-patched SonicWall flaw in January.
A ransomware task force has proposed a variety of technical, policy, and regulatory means for disrupting ransomware, including tracking Bitcoin transactions more closely and mandating ransom payment disclosures.
A threat campaign is relying on cross-site scripting attacks to deliver malware to and steal credentials from online shops.
The Ghostwriter influence campaign has expanded its targeting and TTPs, with researchers linking parts of it to the UNC1151 threat group.
The Naikon APT group attributed to China has been using a new backdoor known as Nebulae in attacks against military organizations in Asia.
The macOS vulnerability allowed attackers to bypass Apple’s core security defenses with specially-crafted application bundles.