Hacking | SC Media

Hacking

Thunderbolt ports vulnerable to hands-on hacks

A threat actor with just five minutes of direct access to a computer’s Thunderbolt port can steal encrypted data and clean out the device’s system memory due to seven specific security lapses in the Intel-developed port. The vulnerabilities, named Thunderspy, were brought to light by Björn Ruytenberg, a graduate student at the Eindhoven University of…

Experts share new insight on Sandworm APT exploits, BlackEnergy malware

Ring mandating 2FA logins, ceases some third-party activity

Camera doorbell maker Ring is pushing through a new level of security by now making mandatory for all users to implement two-factor authentication when setting up their device. Two-factor authentication previously had been available as an option, but the company said going forward all users must go through this step when accessing their Ring account.…

Cyberinsurance: The value from an incident response lens

Cyberinsurance is not new to the scene, and an increasing number of organizations are accepting its critical role in safeguarding them against costly cybersecurity incidents. Yet recently, we’ve seen ongoing discussion of its overall value to organizations, as well its net impact to the state of cybersecurity. As pundits discuss, debate, and ponder, crippling cyber…

Spoiler alert: Attack simulation isn’t ethical hacking

Everything you wanted to know about Breach and Attack Simulation (BAS) vs. Automated Penetration Testing Better prepared, Right!? Companies are investing a significant amount of resources in building and improving their cybersecurity posture. As the threat landscape continues to evolve and expand, this investment continues to rise dramatically. Per a report by Cybersecurity Ventures, worldwide…

2019’s weird and wonderful news

Dead Cows, HackerGiraffes, fast food-craving lemmings, foul-mouthed scooters and golf pranksters made SC Media’s rather eclectic list of the most bizarre cyber news from the last 12 months.  In 2016, hackers tried to influence who became president. This time, hackers are running for president!   Well, make that a former teenage hacker – and a fairly harmless one at…

Bugcrowd breaks its weekly bounty payout record

For the first time in Bugcrowd’s seven-year history it paid out more than $500,000 in bounty fees to its white hats in a one-week period. For all of October more than 550 white-hat hacker working with Bugcrowd earned $1.6 million with the top recipient taking home $40,000. “As those on the Bugcrowd platform know, and…

Next post in Mobile Security