CISA Emergency Directive Orders Mitigations After Microsoft Breach
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
CISA has laid out the proposed details of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA).
Iranian threat actor TA453 has been sending spear-phishing emails that impersonate real individuals from Western foreign policy research institutions.
While awareness about election security has increased since 2016, threat actors launching espionage and disinformation campaigns are also leveling up, warn security experts.
Chainalysis said it worked with law enforcement to recover $30 million in stolen funds from the March Axie Infinity currency heist.
Welcome back to Source Code, Decipher's weekly security news podcast.
The North Korean state-sponsored group has been targeting VMware Horizon servers vulnerable to Log4j in order to infect energy firms with malware.