Charles Shirer, a red teamer, hacker, and FreeBSD enthusiast, joins Dennis Fisher to talk about his path to working in security, learning to hack, and his motivational videos.
Attackers exploited a previously-disclosed flaw in Fortinet VPN servers in order to hit European industrial firms with the Cring ransomware.
Idan Plotnik of Apiiro Security discusses the value of a risk-based approach to software development and deployment.
Apple said its App Tracking Transparency rules will restrict advertisers’ abilities to track user behavior, while still giving them the option to analyze the impact of their ads.
Attackers are targeting SAP enterprise applications that have not been updated to address previously-fixed flaws, researchers warn.
The EtterSilent builder has been used in campaigns alongside Ryuk ransomware, the Gozi banking trojan, and BazarLoader.
Idan Plotnik, CEO of Apiiro, joins Dennis Fisher to talk about taking a risk-based approach to code and securing the software development lifecycle.
Senators pressure eight digital advertising exchanges - including Twitter, Google and AT&T - to disclose who is collecting what specific user data during the real-time bidding process.
An indictment this week resulting from a 2019 intrusion at a Kansas water utility highlights the budgetary and technical limitations utilities face.
Enterprises are patching more high-risk vulnerabilities faster now than just a year ago, new data from Kenna Security shows.
The Phosphorus attack group, also known as Charming Kitten, recently targeted medical researchers in a new spear phishing campaign.
A new malware campaign that targets gamers with the promise of cheat codes could have repercussions for enterprise employees working remotely on personal machines.
Weaknesses in operational technology systems are becoming prime targets for attackers, thanks to difficulties in patching complex systems.
Decipher's new executive editor, Lindsey O'Donnell-Welch, joins Dennis Fisher to talk about getting into security journalism, the challenges of telling highly technical stories, and how it can help defenders do their jobs more efficiently.
An attacker pushed two malicious commits to the PHP source code Git server on Sunday, adding a backdoor, which was quickly removed.