Category Archives: Security News

Data on 3.2 million DriveSure clients exposed on hacking forum

Hackers published data on 3.2 million users lifted from DriveSure data on the Raidforums hacking forum late last month. To prove the data’s quality, threat actor “pompompurin” detailed the leaked files and user information information in a lengthy post, according to researchers at Risk Based Security, who were the first to report the breach. The…

The post Data on 3.2 million DriveSure clients exposed on hacking forum appeared first on SC Media.

Continue reading

Posted in Data Protection, Data security, Security News, Threat intelligence | Comments Off on Data on 3.2 million DriveSure clients exposed on hacking forum

Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

Despite increased perceptions about the value of cyber threat intelligence, many businesses and industries still struggle to define what it actually means to them: which capabilities to incorporate, and how to do the ground level planning necessary to support the telemetry and technological tools they put in place.

The post Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs appeared first on SC Media.

Continue reading

Posted in Network Security, Security News, Security strategy, Threat intelligence | Comments Off on Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

The cloud divide: Risks and rewards for companies that moved pre-pandemic

Cloud enabled a lot of organizations to shift fast, accommodating the new business requirements that emerged with the pandemic. But where did security fit into the equation? SC Media spoke to Vikram Kunchala of Deloitte to find out.

The post The cloud divide: Risks and rewards for companies that moved pre-pandemic appeared first on SC Media.

Continue reading

Posted in Cloud, Cloud Security, Featured, Risk Management, Security News | Comments Off on The cloud divide: Risks and rewards for companies that moved pre-pandemic

SC Product Reviews: Identity & Access Management

Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…

The post SC Product Reviews: Identity & Access Management appeared first on SC Media.

Continue reading

Posted in Identity and Access Management, Security News | Comments Off on SC Product Reviews: Identity & Access Management

SC Product Reviews: Identity & Access Management

Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…

The post SC Product Reviews: Identity & Access Management appeared first on SC Media.

Continue reading

Posted in Identity and Access Management, Security News | Comments Off on SC Product Reviews: Identity & Access Management

SC Product Reviews: Identity & Access Management

Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…

The post SC Product Reviews: Identity & Access Management appeared first on SC Media.

Continue reading

Posted in Identity and Access Management, Security News | Comments Off on SC Product Reviews: Identity & Access Management

SC Product Reviews: Identity & Access Management

Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…

The post SC Product Reviews: Identity & Access Management appeared first on SC Media.

Continue reading

Posted in About Reviews, Group Tests, Product News, Product reviews, Reviews, Security News | Comments Off on SC Product Reviews: Identity & Access Management

Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide

Some 250 servers were apparently breached by the Lebanese Cedar APT group, an organization with suspected links to the Hezbollah Cyber Unit in Lebanon. The target victims include companies from many countries, including the United States, United Kingdom, Saudi Arabia, Egypt, Jordan, Lebanon, Israel and the Palestinian Authority. Many more companies and organizations have been…

The post Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide appeared first on SC Media.

Continue reading

Posted in APTs/cyberespionage, Cyberespionage, Security News, Threat intelligence, Threat Security Intelligence | Comments Off on Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide

Firms with exposed IoT have a higher concentration of other security problems

Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. For example, companies with exposed IoT are more than 50% more likely to have email security issues, according to a new report and blog post…

The post Firms with exposed IoT have a higher concentration of other security problems appeared first on SC Media.

Continue reading

Posted in IoT, Mobile Security, Network Security, Security News | Comments Off on Firms with exposed IoT have a higher concentration of other security problems