Author Archives: Derek B. Johnson

Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

Despite increased perceptions about the value of cyber threat intelligence, many businesses and industries still struggle to define what it actually means to them: which capabilities to incorporate, and how to do the ground level planning necessary to support the telemetry and technological tools they put in place.

The post Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs appeared first on SC Media.

Continue reading

Posted in Network Security, Security News, Security strategy, Threat intelligence | Comments Off on Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

Cryptojacking malware targeting cloud apps gets new upgrades, worming capability

A piece of cryptojacking malware with a penchant for targeting the cloud has gotten some updates that makes it easier to spread and harder for organizations to detect when their cloud applications have been commandeered.

The post Cryptojacking malware targeting cloud apps gets new upgrades, worming capability appeared first on SC Media.

Continue reading

Posted in Cloud, Cryptocurrency, Malware, Security News | Comments Off on Cryptojacking malware targeting cloud apps gets new upgrades, worming capability

Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

The voluntary, collaborative posture taken by different private and public stakeholders is what sets this takedown apart from others.

The post Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders appeared first on SC Media.

Continue reading

Posted in Cybercrime, Ransomware, Security News | Comments Off on Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

The voluntary, collaborative posture taken by different private and public stakeholders is what sets this takedown apart from others.

The post Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders appeared first on SC Media.

Continue reading

Posted in Cybercrime, Ransomware, Security News | Comments Off on Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

Google to offer suite of new zero trust capabilities through Chrome browser

With backing from Google infrastructure and support from a host of industry partners, the features have the potential to significantly expand the footprint of zero trust solutions within industry and government.

The post Google to offer suite of new zero trust capabilities through Chrome browser appeared first on SC Media.

Continue reading

Posted in Cloud, Cloud Security, Network Security, Security News, Software and solutions, Zero Trust | Comments Off on Google to offer suite of new zero trust capabilities through Chrome browser

Google discloses spearphishing targeting security researchers

Depending on how widespread the compromises were, it could potentially taint some research and defensive strategies that threat intelligence firms share with businesses and other organizations.

The post Google discloses spearphishing targeting security researchers appeared first on SC Media.

Continue reading

Posted in Featured, Phishing, Security News, Threat intelligence | Comments Off on Google discloses spearphishing targeting security researchers

CISA launches ransomware education program

The effort encourages governments, schools and private companies to take steps to protect their systems and data from ransomware.

The post CISA launches ransomware education program appeared first on SC Media.

Continue reading

Posted in Government, Ransomware, Security News | Comments Off on CISA launches ransomware education program

Reliance on cloud, APIs create confusion and introduce risk into software development

Businesses are increasingly hosting their applications in public or private clouds while using APIs to speed up the development process. Both shifts come with security implications.

The post Reliance on cloud, APIs create confusion and introduce risk into software development appeared first on SC Media.

Continue reading

Posted in Application Security, Cloud, Cloud Security, Security News | Comments Off on Reliance on cloud, APIs create confusion and introduce risk into software development

7 vulnerabilities in popular DNS forwarding software open door to range of attacks

Researchers at JSOF have discovered distinct spoofing and buffer overflow vulnerabilities associated with DNSMasq, used in networking devices to cache and forward Domain Name System requests.

The post 7 vulnerabilities in popular DNS forwarding software open door to range of attacks appeared first on SC Media.

Continue reading

Posted in Network Security, Security News, Threat intelligence, Vulnerabilities, Vulnerability Management | Comments Off on 7 vulnerabilities in popular DNS forwarding software open door to range of attacks