You searched for russian | SC Media

Your search for russian returned 238 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Post remove
Network Security remove

Your search for russian returned 238 results

Sort Results:

Relevant Recent
Featured, Network Security, Security News, Year in Review

Account takeovers: Insiders need not be malicious to cause chaos

With 2020 coming to a close, SC Media is delivering through a series of articles our picks of the most high impact events and trends of the last year, which we predict will factor into community strategies in 2021 and beyond. This is the first in that series.
Access Control, Cryptocurrency, Cybercrime, Insider Threats, Network Security, Security News, Web Services Security, E-Commerce Security

Twitter hack is a reminder of the dangers of unfettered employee access

Twitter’s acknowledgement that a “coordinated social engineering campaign” involving multiple employees was behind a hack of prominent verified accounts raises significant questions as to whether business organizations are implementing effective security controls that limit potential insider threats’ access to back-end administrative tools. The hacking incident — which promoted a cryptocurrency scam and victimized the accounts…
Cybercrime, Data Breach, Network Security, Ransomware, Security News, Vulnerabilities

Citrix fixes bug used in ransomware attacks; Auto maker GEDIA falls victim to exploit

Citrix over the last six days has been releasing firmware updates to fix CVE-2019-19781, a critical remote code execution vulnerability in its Citrix Application Delivery Controller, Citrix Gateway and SD-WAN WANOP products, which cybercriminals have actively exploited in an attempt to deliver ransomware, backdoors and coin miners. The Fort Lauderdale, Fla.-based software company has now…
Network Security, Security News, Vulnerabilities

Microsoft fixes exploited privilege elevation flaw, 34 more bugs

For its final Patch Tuesday release of the year, Microsoft Corporation issued a series of security updates that fixed a total of 35 vulnerabilities, seven of which were deemed critical and one of which was found to be actively exploited. The most severe flaws consist of remote code execution vulnerabilities in Git for Visual Studio…
APTs/cyberespionage, Cybercrime, Events, Malware, Network Security, Ransomware, Research, SC Security Ops Center, Security News, Vulnerabilities

We interviewed cyber experts on a Vegas ferris wheel. Then ride security showed up…

In the film “Ocean’s 11,” Danny Ocean and his team of expert cybercriminals execute a daring casino heist in glitzy Las Vegas. This past summer at the Black Hat and DEF CON conferences in Sin City, the editorial staff at SC Media attempted to pull off a less ambitious – and decidedly more legal –…
Election Coverage, Government, Government/Defense, Network Security, Security News, States of Security

State of security: Iowa

Who’s in charge: Secretary of State Paul Pate, Director of Elections Dawn Williams Iowa uses nothing but paper ballots for all forms of voting, and then tabulates the votes with ballot marking technology or optical scanners. The auditing process has come under some criticism for a variety of perceived flaws, including its scope, which is limited to a…
Election Coverage, Government, Government/Defense, Network Security, Security News, States of Security

State of Security: Delaware

Who’s in Charge: Commissioner of Elections Elaine Manlove Delaware may be known as the First State, but it certainly doesn’t come in first when it comes to cybersecurity. To document and tabulate its residents’ votes, the tiny mid-Atlantic state uses the Danaher Shouptronic 1242 – a push-button direct-record electronic solution that does not have a voter-verified…
Election Coverage, Government/Defense, Network Security, Security News, States of Security

State of security: Pennsylvania

Who’s In Charge: Secretary of State Robert Torres, Commissioner of Elections Jonathan Marks Pennsylvania intends to eliminate all electronic voting machines that fail to produce voter-verified paper audit trails (VVPATs) by the year 2020. While that’s an important step, it won’t do much good in the 2018 midterm elections, during which time 50 out of the Keystone State’s 67 counties will…
Next post in Election Coverage