You searched for dropbox/ | SC Media

Your search for dropbox/ returned 7 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove

Your search for dropbox/ returned 7 results

Sort Results:

Relevant Recent
Executive Insight, Phishing

Going stealth: Bad guys embrace the power of branding

By Stu Sjouwerman Since the very dawn of organized phishing attacks, the bad guys have recognized the power of exploiting trusted brands and online services. Our original experience with phishing was defined by spoofed emails purporting to hail from popular banks. Their objective was simple: trick users into coughing up their online banking credentials with…
Analyst says insider threat mainly down to lack of understanding
Insider Threats, Privacy & Compliance News and Analysis, Security News

Former Yahoo! engineer pleads guilty to using access to nick pics of women

Reyes Daniel Ruiz, a former Yahoo! software engineer, has pleaded guilty to using his access privileges at the company to hack users’ accounts so that he could download private images and videos mostly belonging to young women. A 10-year veteran of Yahoo!, Ruiz admitted to accessing around 6,000 accounts and storing the pilfered files at…
APT10
APTs/cyberespionage, Cybercrime, Security News

MuddyWater, Fin8 and Platinum threat actors back in action

Researchers have spotted the MuddyWater, Fin8 and Platinum cybergangs all making an unwanted comeback following an observed increase in malicious activity over the last few weeks. Trend Micro came across several campaigns its researchers believe contain the hallmarks of MuddyWater. But this time around the group apparently deployed a new multi-stage PowerShell-based backdoor called POWERSTATS…
Cybercrime, Malware, Ransomware, Security News

Cybercriminals abuse Bitbucket to infect users with potpourri of malware

A newly discovered attack campaign has been abusing the online storage platform Bitbucket to maintain and update a wide assortment of malware, in a plot to infect computer users who download free, cracked versions of commercial software from the internet. Researchers at Cybereason’s Nocturnus team, who uncovered the threat, estimate that more than 500,000 machines…
Executive Insight, Opinion

Five non-phishing types of cyberattacks to prepare for

Everybody is talking about email, browsing, and phishing as the main attack scenarios organizations should care about. However, in the real world, determined attackers use a variety of additional techniques that are in many cases under the radar of enterprise security teams. There are many of those attacks out there, and they’re gaining popularity. Here…
Advertise

Uncomfortable Truth #1 about Phishing Defense

Part 1 of a 5-part series.    The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks.   Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee…
Insider Threats, SC Security Ops Center, Security News

Inside-out analytics: Solving the enigmatic insider threat

At the risk of potentially alienating a high-demand workforce that potentially can jump to a new company for seemingly minor perks such as company-paid cafeterias or flex time with little oversight, CISOs today find themselves with a challenge. In order to protect their corporations against data breach from internal and external sources, CISOs have a…
Next post in Insider Threats