You searched for dropbox/ | SC Media

Your search for dropbox/ returned 161 results

Your search for dropbox/ returned 161 results

Sort Results:

Relevant Recent
Executive Insight, Opinion

Five non-phishing types of cyberattacks to prepare for

Everybody is talking about email, browsing, and phishing as the main attack scenarios organizations should care about. However, in the real world, determined attackers use a variety of additional techniques that are in many cases under the radar of enterprise security teams. There are many of those attacks out there, and they’re gaining popularity. Here…
Cybercrime, Malware, Ransomware, Security News

Cybercriminals abuse Bitbucket to infect users with potpourri of malware

A newly discovered attack campaign has been abusing the online storage platform Bitbucket to maintain and update a wide assortment of malware, in a plot to infect computer users who download free, cracked versions of commercial software from the internet. Researchers at Cybereason’s Nocturnus team, who uncovered the threat, estimate that more than 500,000 machines…
Analyst says insider threat mainly down to lack of understanding
Insider Threats, Privacy & Compliance News and Analysis, Security News

Former Yahoo! engineer pleads guilty to using access to nick pics of women

Reyes Daniel Ruiz, a former Yahoo! software engineer, has pleaded guilty to using his access privileges at the company to hack users’ accounts so that he could download private images and videos mostly belonging to young women. A 10-year veteran of Yahoo!, Ruiz admitted to accessing around 6,000 accounts and storing the pilfered files at…
Insider Threats, SC Security Ops Center, Security News

Inside-out analytics: Solving the enigmatic insider threat

At the risk of potentially alienating a high-demand workforce that potentially can jump to a new company for seemingly minor perks such as company-paid cafeterias or flex time with little oversight, CISOs today find themselves with a challenge. In order to protect their corporations against data breach from internal and external sources, CISOs have a…
APT10
APTs/cyberespionage, Cybercrime, Security News

MuddyWater, Fin8 and Platinum threat actors back in action

Researchers have spotted the MuddyWater, Fin8 and Platinum cybergangs all making an unwanted comeback following an observed increase in malicious activity over the last few weeks. Trend Micro came across several campaigns its researchers believe contain the hallmarks of MuddyWater. But this time around the group apparently deployed a new multi-stage PowerShell-based backdoor called POWERSTATS…
Executive Insight, Phishing

Going stealth: Bad guys embrace the power of branding

By Stu Sjouwerman Since the very dawn of organized phishing attacks, the bad guys have recognized the power of exploiting trusted brands and online services. Our original experience with phishing was defined by spoofed emails purporting to hail from popular banks. Their objective was simple: trick users into coughing up their online banking credentials with…
Advertise

Uncomfortable Truth #1 about Phishing Defense

Part 1 of a 5-part series.    The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks.   Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee…
Executive Insight, Opinion, SC Security Ops Center, Security News

It’s raining phishes out there. Do you know what your users are doing?

If you work in the IT trenches, there has likely come a moment while you were sitting in your office, reviewing the latest news about current phishing campaigns, when you suddenly looked up and cast your eyes across the floor, pondering a very basic question: just what are your users doing with all those malicious…
leakplumbing_863980
Security News

Dozens of high-profile Box accounts found leaking sensitive data

Adversis researchers have discovered that dozens of companies have leaked sensitive data as a result of misconfigured Box accounts. Box is a cloud based “content management platform” primarily used to share files and folders and similar to AWS S3 buckets. The files can be shared to anyone with the link, restricted to those within a…
APTs/cyberespionage, Cybercrime, Malware, Phishing, Security News

North Korean hackers allegedly pick on Russian targets for a change

The reputed North Korean APT actor known as Lazarus Group (aka Hidden Cobra) typically focuses its hacking efforts on South Korea, Japan and the U.S., but one of its suspected campaigns from last January surprisingly appears to have targeted Russian businesses with its signature Lazarus backdoor malware. Taking place from Jan. 26-31, the phishing campaign…
Next post in Security News