You searched for dormant | Page 2 of 11 | SC Media

Your search for dormant returned 102 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for dormant returned 102 results

Sort Results:

Relevant Recent
black shades
Ransomware, Security News

Shade ransomware gang gives up keys, apologizes to victims

The malicious actors behind Shade ransomware made an unusual announcement on GitHub, not only publishing all 750,000 decryptor keys for the malware but apologizing for their criminal actions. “We are the team which created a trojan-encryptor mostly known as Shade, Troldesh or Encoder.858. In fact, we stopped its distribution in the end of 2019.” the…
Executive Insight, Opinion

A 10-point plan for securing remote workers

Globally, more and more organizations are beginning to enforce work from home policies for employees and contractors. Opening up this kind of remote access for employees and contractors across all departments is new for many organizations. While several organizations have remote access for their IT support personnel, allowing access for all major departments, including core…
Cybercrime, Password management, Security News

OurMine hackers intercept NFL teams’ social media accounts

Over a dozen NFL teams may want to consider hiring a cyber defensive coordinator after their Twitter, Instagram and Facebook accounts were reportedly hijacked and defaced on Sunday and Monday by the mischievous OurMine hacker group, which has emerged from hibernation. According to multiple news sources, the hackers compromised the NFL’s league Twitter and Facebook…
Executive Insight, Opinion

Marrying VDI and security: Choose the right tools, not more tools

Virtualization has long been perceived as the holy grail of business agility, simplified management, return on investment, and even security. While the benefits of virtual desktop infrastructure (VDI) are undeniable, the security aspect is, unfortunately, a myth. The security aspect of VDI is not only misunderstood, it is also often perceived as a drag on…
IoT, Network Security, Security News, Vulnerabilities

Malicious voice apps can turn Alexa and Google Home devices into spies, say researchers

Cybercriminals could potentially develop malicious voice apps that turn Amazon Alexa devices and Google Home smart speakers into spy equipment that eavesdrops on users and even phishes for passwords, according to a new report. The report, from Germany-based Security Research Labs (SRLabs), warns that security lapses in the way Google Home and Alexa devices (such…
Variant of Emotet banking malware used in spam campaign
Malware, Security News

Emotet back in action

The Emotet botnet is back from a four-month vacation with a new spam campaign that began early on September 16. The initial burst of emails mainly targeted German, Polish, and Italian speakers with a sprinkling of English folks also receiving the emails with a subject line containing the phrase “payment remittance advice,” the Malwarebytes Threat…
Cryptocurrency, Cybercrime, Finance, Malware, Ransomware, Security News

Malvertising scheme abuses Yandex.Direct, targets Russian accountants with assorted malware

Cybercriminals are abusing the Yandex.Direct online advertising service in order to serve up malicious ads that target Russian accountants with the goal of infecting them with banking trojans and ransomware. Researchers from ESET have so far linked six malware programs to this campaign, which began in October and continues to this day. During periods of…
Sponsor Content

Uncomfortable Truth #1 about Phishing Defense

Part 1 of a 5-part series.    The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks.   Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee…
Product Review

SonicWall Hosted Email Security

SonicWall Hosted Email Security provides multilayered, inbound and outbound protection from advanced threats with advanced protection techniques like Adversarial Bayesian filtering. SonicWall subsequently enforces data loss prevention and compliance policies. It leverages real-time threat intelligence feeds from more than one million security sensors deployed globally as part of the SonicWall Cloud Platform. It has been…
Data Breach, Security News, Vulnerabilities

Equifax neglected cybersecurity prior to breach, Senate report finds

On the eve of executives from Equifax CEO and Marriott appearing before the Senate Permanent Subcommittee on Investigations to discuss the lessons learned from a pair of major breaches, the subcommittee released a scathing report accusing Equifax of neglect and “failing to prioritize cybersecurity,” which led to a 2017 breach that affected 145 million people.…
Next post in Security News