You searched for coverage | Page 2 of 20 | SC Media

Your search for coverage returned 200 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

News remove
Security News remove

Your search for coverage returned 200 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Election Coverage, Government, Government/Defense, Security News

Biden will punish foreign election interference, hacking

Former Vice President and presumptive Democratic presidential nominee Joe Biden said he would take harsh action against any nation-state that attempted to meddle in the U.S. presidential election, “whether by hacking voting systems and databases, laundering money into our political system, systematically spreading disinformation, or trying to sow doubt about the integrity of our elections.”…
Election Coverage, Government/Defense, Security News

Here are the hurdles that will face Biden’s new CISO

As the newly appointed CISO of Joe Biden’s presidential campaign, Chris DeRusha, former chief security officer with the State of Michigan, has fewer than four months to implement his cybersecurity vision before Election Day arrives — all in the midst of a pandemic that has altered the traditional way that campaigns traditionally operate. DeRusha will…
APTs/cyberespionage, Cybercrime, Malware, Mobile Security, Security News

Report accuses China of extensive mobile spyware use to track ethnic minority group

A new blog post and research report from the Lookout Threat Intelligence Team has exposed the lengths to which a reputed Chinese government-sponsored APT operation has allegedly gone to track the country’s Uyghur minority population, including the trojanization of mobile apps with surveillanceware. Lookout details four spyware families — SilkBean, DoubleAgent, CarbonSteal and GoldenEagle —…
InfoSec World 2020, Security News

Aflac’s Tim Callahan presses hard line on managing third-party risk

Ask 100 people to define risk and you’ll get 100 definitions (if not more), but all typically agree on one thing: identifying and managing risk is extremely important to an organization’s livelihood and resilience. It can make a difference in curbing, mitigating and/or recovering from cybersecurity incidents. Recently, that resilience and the ability to manage…
Cybercrime, Ransomware, Security News

Dodging AV and endpoint defenses is a ‘snap’ for new Thanos ransomware

Researchers say that a new ransomware builder tool named after the super-villain Thanos — made available for sale on dark web forums — is the first to strategically use RIPlace, a Microsoft Windows file system technique that’s known to bypass antivirus protections and endpoint detection and response solutions. The implementation of RIPlace, combined with the…
Coronavirus, Security News

Cut costs while bolstering cybersecurity during Covid-19

The Covid-19 pandemic may have driven cybersecurity investments up – and bottom lines down – as businesses struggle to adapt to new operating realities and close security gaps, but savvy organizations can still cut costs while boosting security.   Many companies may have already put projects on the chopping block and pared back headcounts in…
Ransomware, Security News

Microsoft warns of ransomware attacks with ‘motley crew’ of payloads

Ransomware delivering a “motley crew” of payloads is straining security operations especially in health care, Microsoft warned, urging security teams to look for signs of credential theft and lateral movement activities that herald attacks. Examination of an uptick in ransomware attacks during the first two weeks “showed that many of the compromises that enabled these…
SC Corporate News, Security News

Help SC honor Women and Diversity in Cybersecurity with your recommendations

More women may be working in the cybersecurity industry nowadays, but full equality in this space and other sectors is a long way off.  That’s why we at SC Media have been celebrating thought-leading female professionals and the need to elevate overall diversity in the cybersecurity industry in our special annual coverage and hardcopy edition for seven years. To…
GOP Logo
Privacy & Compliance, Security News

GOP canvassing app credentials exposed in code repository

Access credentials for Campaign Sidekick app, used by Republican campaigns for voter contacts, surveys and canvassing, were exposed in a code repository within a publicly accessible .git directory, a version control system that records code base changes during software development so that developers can work from the same code.   “The same operations that make…
Next post in Security News