Security news that informs and inspires

All Articles

1660 articles:

Attackers Exploiting Two Microsoft Exchange Zero Days

Attackers are exploiting two new Microsoft Exchange zero days ( CVE-2022-41040 and CVE-2022-41082) in the wild. Microsoft is working on a patch.

Microsoft, Zero Day

Decipher Podcast: Source Code 9/30

Welcome back to Source Code, Decipher's weekly security news podcast.

Podcast, Source Code

Threat Actor Delivered Malware Via Trojanized Live Chat Installer

The trojanized file was identified at organizations in the industrial, healthcare, technology, manufacturing, insurance and telecommunications sectors in North America and Europe, according to researchers.

Malware

Novel Malware Installed in VMware ESXi Attacks

Attackers used a unique tactic to install backdoors after compromising multiple organizations' VMware ESXi servers.

Vmware

Lazarus Group Affiliate Uses Trojanized Open Source Apps in New Campaigns

Zinc, a Lazarus group offshoot, is using trojanized versions of open source apps such as KiTTY and PuTTY in a new phishing campaign.

North Korea, Microsoft

New Chaos Malware Targets Windows and Linux Devices

A new piece of malware known as Chaos that is built for Windows and Linux systems is infecting home routers, enterprise servers, and other devices and launching DDoS attacks.

Malware, Botnet, China

Phishing Attack Targets Microsoft Flaw to Deliver Cobalt Strike

The attack was first discovered in August after victims received phishing emails containing malicious document attachments.

Phishing

Node.js Update Fixes High Severity Flaws

An update for the Node.js framework includes fixes for DNS rebinding and HTTP smuggling vulnerabilities.

Vulnerabilities, Javascript

Watchdog Report Highlights Nuclear Agency’s Security Shortcomings

The Government Accountability Office criticized the National Nuclear Security Administration's mixed risk management practices around operational technology devices and its lax oversight of subcontractor cybersecurity practices.

Government, Government Agencies

CISA: Critical Zoho ManageEngine Flaw Actively Exploited

The critical-severity unauthenticated remote code execution flaw is now being actively exploited, according to CISA.

Exploit, Vulnerability

Decipher Podcast: Source Code 9/23

Welcome to Source Code: Decipher's behind-the-scenes look at the weekly news with input from our sources.

Source Code, Podcast

The NSA is Here to Help

The NSA's new Cybersecurity Collaboration Center is the centerpiece of an effort to provide more information and context for private sector defenders.

Nsa

New Metador APT Discovered Targeting ISPs, Telcos

Researchers have discovered a new APT actor called Metador that has been targeting ISPs, telcos, and universities in the Middle East and Africa.

Apt

Attackers Deploying Noberus Ransomware Update Tactics

The Noberus ransomware (also known as BlackCat and ALPHV) has received a major update, and affiliates deploying it have also evolved their tactics.

Ransomware

Government Makes Headway in Executing Cybersecurity Commission’s Recommendations

A new report by the CSC 2.0 pointed to both progress and "unfinished business" in the government's implementation of its recommendations for bolstering its cybersecurity strategy.

Government