You searched for RiskIQ/ | SC Media

Your search for RiskIQ/ returned 9 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 6 months remove

Your search for RiskIQ/ returned 9 results

Sort Results:

Relevant Recent

Did you mean: riski/

Product Review

RiskIQ Digital Footprint

RiskIQ Digital Footprint uses a unique mixture of web crawling and port scanning to discover digital assets then analyze them for vulnerabilities. This approach extends vulnerability control outside of the firewall to find and eliminate JavaScript threats and secure cloud expansion. Digital Footprint discovers unknown pages and IP addresses to visualize exposures in real time,…
Cybercrime, Malware, Retail, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security

Report: NutriBullet’s website injected with skimmer three times by Magecart Group 8

Since February, a prominent Magecart cybercriminal group has injected the same Java-based payment card skimmer program not one, not two, but three times into the compromised international website of blender manufacturer NutriBullet, researchers from RiskIQ have reported. Each time a skimmer was removed from nutribullet.com, the criminal actors, known as Magecart Group 8, would reintroduce…
Officials preparing for cyber attacks, scams as Olympics nears
Malware, Security News

Magecart Group 12 named as actor behind Olympic ticket POS attack

The ticket reselling sites olympictickets2020.com and eurotickets2020.com reportedly have been compromised with Magecart POS skimming malware. Magecart was first spotted on the two sites , which deal in tickets for the upcoming 2020 Tokyo Olympics EUFA Euro 2020, and were detailed In late January by researchers Jacob Pimental and Max Kersten and RiskIQ took the…
Retail & IT Security
Privacy & Compliance News and Analysis, Ransomware, Retail, Security News, Web Services Security, E-Commerce Security

Magecart skimmer strikes Fitness Depot at checkout

A Magecart credit card skimmer scheme used on Canadian fitness equipment retailer Fitness Depot’s e-commerce system Feb. 18 affected an undisclosed number of customers requesting either at-home delivery or in-store pickup at one of the company’s 40 stores. A bogus form placed on the Fitness Depot website managed to capture names, addresses, email addresses, telephone…
Security News

Misconfigured S3 exposes Twilio users to Magecart attack

A misconfiguration in an S3 bucket that was hosting a Twilio Javascript library caused a bad threat actor to inject code that made Twilio users load an extraneous URL on their browsers that has been associated with the Magecart group of attacks. In a company blog, Twilio said this solely affected v1.20 of the TaskRouter JS…
Reviews, Security News

Vulnerability management

A well-run vulnerability management program removes the guesswork, says Katelyn Dunn. his month, we revisited a mixture of familiar and new faces. Vulnerability management is such a basic security element that occasionally it gets overlooked. However, these tools should be a staple in every security arsenal by now. In some cases, organizations may deploy more…
Coronavirus

Rush to adopt online learning under COVID-19 exposes schools to cyberattacks

As the COVID-19 pandemic rages, the cyber community has rightly focused on protecting the health care industry from malicious hackers but education is at risk, too, as recently homebound students attend school in record numbers via online edtech platforms, e-learning environments and video conferencing. In a public service announcement this month, the FBI’s Internet Crime…
Emerging Products, Reviews

AttackIQ Platform v2.17

Vendor: AttackIQ Price: $5,000 per test endpoint Contact: www.attackiq.com Quick Read What it does: AttackIQ Platform identifies gaps in production environments and helps mitigate risk so organizations may measure the effectiveness of their security posture and increase the overall return on investment of their existing security tools. What we liked: We very much appreciate the…
Reviews, Security News

Emerging Products: Breach and attack simulation technologies

 Manual security testing can’t keep pace with the threat landscape. Penetration testing takes time and it’s costly and labor-intensive. It’s also fully dependent on the expertise of the penetration tester. Despite these inefficiencies, security pros need to test security posture and validate controls. Organizations have no way of knowing the efficacy of controls configurations or…
Next post in Reviews