Category Archives: Security News
Data on 3.2 million DriveSure clients exposed on hacking forum
Hackers published data on 3.2 million users lifted from DriveSure data on the Raidforums hacking forum late last month. To prove the data’s quality, threat actor “pompompurin” detailed the leaked files and user information information in a lengthy post, according to researchers at Risk Based Security, who were the first to report the breach. The…
The post Data on 3.2 million DriveSure clients exposed on hacking forum appeared first on SC Media.
Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs
Despite increased perceptions about the value of cyber threat intelligence, many businesses and industries still struggle to define what it actually means to them: which capabilities to incorporate, and how to do the ground level planning necessary to support the telemetry and technological tools they put in place.
The post Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs appeared first on SC Media.
The cloud divide: Risks and rewards for companies that moved pre-pandemic
Cloud enabled a lot of organizations to shift fast, accommodating the new business requirements that emerged with the pandemic. But where did security fit into the equation? SC Media spoke to Vikram Kunchala of Deloitte to find out.
The post The cloud divide: Risks and rewards for companies that moved pre-pandemic appeared first on SC Media.
SC Product Reviews: Identity & Access Management
Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…
The post SC Product Reviews: Identity & Access Management appeared first on SC Media.
SC Product Reviews: Identity & Access Management
Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…
The post SC Product Reviews: Identity & Access Management appeared first on SC Media.
SC Product Reviews: Identity & Access Management
Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…
The post SC Product Reviews: Identity & Access Management appeared first on SC Media.
SC Product Reviews: Identity & Access Management
Editor’s Note: This set of reviews originally appeared in June 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected]. This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The…
The post SC Product Reviews: Identity & Access Management appeared first on SC Media.
Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide
Some 250 servers were apparently breached by the Lebanese Cedar APT group, an organization with suspected links to the Hezbollah Cyber Unit in Lebanon. The target victims include companies from many countries, including the United States, United Kingdom, Saudi Arabia, Egypt, Jordan, Lebanon, Israel and the Palestinian Authority. Many more companies and organizations have been…
The post Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide appeared first on SC Media.
Firms with exposed IoT have a higher concentration of other security problems
Exposed enterprise IoT devices can be an indicator of security issues to come, with firms sporting exposed devices having a 62% higher density of other security problems, new research shows. For example, companies with exposed IoT are more than 50% more likely to have email security issues, according to a new report and blog post…
The post Firms with exposed IoT have a higher concentration of other security problems appeared first on SC Media.