Category Archives: Security News

Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

The voluntary, collaborative posture taken by different private and public stakeholders is what sets this takedown apart from others.

The post Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders appeared first on SC Media.

Continue reading

Posted in Cybercrime, Ransomware, Security News | Comments Off on Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

The voluntary, collaborative posture taken by different private and public stakeholders is what sets this takedown apart from others.

The post Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders appeared first on SC Media.

Continue reading

Posted in Cybercrime, Ransomware, Security News | Comments Off on Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

Phishing scheme shows CEOs may be ‘most valuable asset,’ and ‘greatest vulnerability’

Cybercriminals have been using a phishing kit featuring fake Office 365 password alerts as a lure to target the credentials of chief executives, business owners and other high-level corporate leaders – often companies’ biggest security liabilities.

The post Phishing scheme shows CEOs may be ‘most valuable asset,’ and ‘greatest vulnerability’ appeared first on SC Media.

Continue reading

Posted in Cybercrime, Email Security, Phishing, Security News | Comments Off on Phishing scheme shows CEOs may be ‘most valuable asset,’ and ‘greatest vulnerability’

BEC attack techniques exploit Microsoft 365 messages

Attackers exploit Microsoft 365 “read receipt” and “out of office” message loopholes to evade auto-remediation of a malicious email.

The post BEC attack techniques exploit Microsoft 365 messages appeared first on SC Media.

Continue reading

Posted in Email Security, Security News, Threat intelligence | Comments Off on BEC attack techniques exploit Microsoft 365 messages

The cyber ‘journeymen’: Apprentices may be the solution to the skills gap

Aspiring infosec professionals have the opportunity to hone their craft as companies develop talent from within, potentially with government funding, and chip away at the diversity problem.

The post The cyber ‘journeymen’: Apprentices may be the solution to the skills gap appeared first on SC Media.

Continue reading

Posted in Careers, Featured, Network Security, Security News, Training | Comments Off on The cyber ‘journeymen’: Apprentices may be the solution to the skills gap

Google to offer suite of new zero trust capabilities through Chrome browser

With backing from Google infrastructure and support from a host of industry partners, the features have the potential to significantly expand the footprint of zero trust solutions within industry and government.

The post Google to offer suite of new zero trust capabilities through Chrome browser appeared first on SC Media.

Continue reading

Posted in Cloud, Cloud Security, Network Security, Security News, Software and solutions, Zero Trust | Comments Off on Google to offer suite of new zero trust capabilities through Chrome browser

Google discloses spearphishing targeting security researchers

Depending on how widespread the compromises were, it could potentially taint some research and defensive strategies that threat intelligence firms share with businesses and other organizations.

The post Google discloses spearphishing targeting security researchers appeared first on SC Media.

Continue reading

Posted in Featured, Phishing, Security News, Threat intelligence | Comments Off on Google discloses spearphishing targeting security researchers

Users of IoT products from three major vendors at risk of DDoS attacks, data leaks

Softing Industrial Automation GmbH, Kepware PTC, and Matrikon Honeywell all provided fixes for their respective products after security firm Claroty privately disclosed them during 2020.

The post Users of IoT products from three major vendors at risk of DDoS attacks, data leaks appeared first on SC Media.

Continue reading

Posted in IoT, Research, Security News, Vulnerability Management | Comments Off on Users of IoT products from three major vendors at risk of DDoS attacks, data leaks

Speed of White House cyber appointments should make CISOs ‘a bit more confident’

The appointments and presumed future appointments draw heavily from people with public sector experience, a move that some praise and others criticize as a failure to consider private sector expertise.

The post Speed of White House cyber appointments should make CISOs ‘a bit more confident’ appeared first on SC Media.

Continue reading

Posted in Featured, Government, Regulation, Security News | Comments Off on Speed of White House cyber appointments should make CISOs ‘a bit more confident’