Cybersecurity News and Product Reviews | SC Media

Home

Sentencing begins for four LulzSec members in London

Trump commutes Roger Stone’s sentence stemming from Mueller probe

President Trump has commuted the sentence of long-time confidante Roger Stone who was to report to prison on July 14 to serve 40 months after being found guilty of seven counts, including obstruction, witness tampering and lying to Congress. During Stone’s trial, which stemmed from Special Counsel Robert Mueller’s probe into Russia’s interference in the…

Here are the hurdles that will face Biden’s new CISO

As the newly appointed CISO of Joe Biden’s presidential campaign, Chris DeRusha, former chief security officer with the State of Michigan, has fewer than four months to implement his cybersecurity vision before Election Day arrives — all in the midst of a pandemic that has altered the traditional way that campaigns traditionally operate. DeRusha will…

Flaws in SETracker watch app posed danger to dementia patients

Security researchers found flaws in a smart tracker that was aimed at the elderly, especially those with dementia or other cognitive issues. In research released late this week, Pen Test Partners found flaws in source code that the manufacturer posted publicly. Most of the watches use SETracker as a backend, an app owned by the…

Citrix, Juniper and VMware patch array of vulnerabilities

Citrix, Juniper and VMware issued a bevy of patches this week. For starters, the Citrix Security Bulletin CTX276688 addressed vulnerabilities in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP appliance. According to CISA, a remote attacker could exploit some of these vulnerabilities to take control…

U.S. universities at risk of back-to-school and Covid-19 email fraud

The top 20 universities based in the U.S. are failing to implement proper DMARC protections and policies, opening the door for fraudsters to spoof their email domains and convincingly impersonate them at a time when students are likely expecting to receive a wealth digital communications related to back-to-school instructions, researchers warn. In particular, students and…

Locky Ransomware

Conti ransomware encrypts files quicker, targets SMB network shares

As Ryuk wanes, a new family of ransomware dubbed Conti, which mimicks many of Ryuk’s commands but sports some unique features that differentiates it from others, is on the rise. “Conti uses a large number of independent threads to perform encryption, allowing up to 32 simultaneous encryption efforts, resulting in faster encryption compared to many other families,”…

5 Elements of Next-Gen Deception Technology

Honeypots are deception technology’s earliest ancestor. IT security researchers started using them in the 1990s to deceive malicious actors who had made it onto the network by interacting with a false system. In this way, honeypots could gather intelligence on and assess the behavior of these malicious actors. They were not created for threat detection.…

hacker in a hoodie

Unsealed indictment alleges Kazakh man is behind Fxmsp hacking group

Federal prosecutors have indicted Andrey Turchin, a 37-year-old citizen of Kazakhstan, on five criminal counts related to his alleged involvement in a financially motivated cybercriminal hacking collective known as Fxmsp that the Department of Justice says cost victims tens of millions of dollars. Turchin — who also individually goes by the alias Fxmsp — and…

Next post in Privacy & Compliance News and Analysis