You searched for cyber | SC Media

Your search for cyber returned 10 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 7 days remove

Your search for cyber returned 10 results

Sort Results:

Relevant Recent
WebCast

Proactive Cyber Defenses

Companies also are being more aggressive about ensuring their supply chains are safe and using threat intelligence to reduce the number of known attack vulnerabilities. What are you doing to protect your network in advance, and how do you sell these proactive programs to your C-Suite
Coronavirus, IoT, Privacy & Compliance News and Analysis, Security News

Work from home survey finds major security lapses as workers share devices, reuse passwords

Stay-at-home workers are threatening corporate IT security with 93 percent of them admitting they reuse passwords and 29 percent allowing other family members to use their company-issued devices for homework and online entertainment, according to a report from CyberArk. In a late April 2020 survey of 3,000 remote office workers and IT professionals in the…
APTs/cyberespionage, Cybercrime, Government, Government/Defense, Security News, Vulnerabilities

‘Sandworm Team’ hackers from Russia are exploiting Exim, warns NSA

The U.S. National Security Agency on Thursday issued an advisory alleging that hackers from Russia’s Main Intelligence Directorate (GRU) have been actively exploiting a remote code execution vulnerability in Exim Mail Transfer Agent (MTA) software, found in Unix-based systems. Researchers and analysts reacting to the agency’s warning say the announcement is an important reminder that…
Executive Insight, Opinion

Achieving an audacious goal by treating cybersecurity like a science

When humans discovered and learned to ‘obey’ the laws of physics and chemistry, we began to thrive in our world.  It enabled us to make fire, build machines much stronger than ourselves, to cure diseases, to fly. What will it take for us to thrive in the world of cyberspace?  What are its laws –…
election hacking
Election Coverage, Government/Defense, Phishing, Security News

Chinese, Iranian phishing campaigns target Biden, Trump campaigns

Joe Biden and Donald Trump’s campaigns may be worlds apart on issues and in style, but they share common cyber enemies, according to the Google Threat Analysis Group (TAG), which said both are the targets of phishing campaigns by nation-states like China and Iran. “Recently TAG saw China APT group targeting Biden campaign staff &…
Executive Insight, Opinion

The price of bad compromises: Enterprises face critical trust gaps

As leaders, the rise of digitization and the cyber risk it presents feels like old news. We’re so inundated with cyber breach stories that we’re almost numb to them. We’re hyper-focused on the bottom line and the digital scale we need to achieve it. Yet it’s become apparent that our digital scale is creating sweeping…
Cybercrime, Ransomware, Security News

UCSF, Conduent are latest to suffer the slings and arrows of ransomware

Academic health research institution the University of California, San Francisco and business process services company Conduent have emerged as two of the latest prominent victims of organized ransomware attacks. UCSF was targeted by the NetWalker (aka MailTo) ransomware group, as evidenced by a post on the cyber gang’s data leak website, while it was the Maze…
Wordpress logo sinking
Database security, Security News

Attack targeted database credentials on 1.3 million WordPress sites

A massive attack at the end of May targeted the database credentials of some 1.3 million WordPress sites. According to a recent Wordfence blog post, the attack took place between May 29 and May 31 and was stopped by the Wordfence Firewall, which blocked more than 130 million attacks. Ram Gall, QA engineer and threat…
Cybercrime, Ransomware, Security News

New ransomware trends spotted: Auctioning stolen files, cybergangs joining forces

The tactics of human-operated ransomware campaigns continue to escalate. Victims who previously feared having their their systems disrupted, their files encrypted and their data stolen and published online may now face another ultimatum: Pay up or have your data auctioned off to the highest bidder. That’s the latest threat from the Sodinokibi/REvil gang, which announced…
Ransomware, Security News

New Tycoon ransomware leverages JIMAGE files, steals PII, encrypts Linux and Windows systems

A new strain of ransomware dubbed Tycoon seeks to take advantage of Java Image (JIMAGE) files that are internal to Java and would typically not raise any red flags for administrators and security managers. The discovery was brought to light by the BlackBerry Research and Intelligence Team in partnership with KPMG’s UK Cyber Response Services,…
Next post in Ransomware