Blogs
Karakurt ransomware negotiator indicted | SC Media
Russian ransomware operation Karakurt member Deniss Zolotarjovs has been indicted in the U.S. for his involvement as a "cold case" nego...
2024 SC Awards Finalists: All finalist profiles
2024 SC Awards Finalists: All finalist profiles
Source link
Vulnerability Management: Tips and Techniques – John Kellerhals – CSP #189
John Kellerhals, CISO at a nationwide MSSP, has more than 20 years of experience in information security, incident response, governance...
Five traits of highly effective vulnerability management programs
The vulnerability landscape constantly evolves, with new and newly-exploited vulnerabilities emerging at any moment. We are nearing a q...
‘ASCII Smuggling’ attack exposes sensitive Microsoft Copilot data
A patched vulnerability in Microsoft 365 Copilot could expose sensitive data by running a novel AI-enabled technique known as "ASCII Sm...
Hunters International ransomware gang threatens to leak US Marshals data
The Hunters International ransomware group is threatening to leak what it claims to be 386 GB of data from the U.S. Marshals Service (U...
MGs, Free Speech, sedexp, Cthulhu, SeaTac, GrimResource, ServiceBridge, Josh Marpet.. – SWN #410
MGs, Free Speech, sedexp, Cthulhu, SeaTac, GrimResource, ServiceBridge, Josh Marpet.. - SWN #410
Source link
Man tried to hack database, fake own death to skirt child support
A man from Kentucky was convicted of trying to breach the state of Hawaii’s personal records database as part of a scheme to fake his o...
Cthulhu Stealer malware scams macOS users — and its own affiliates
A newly identified malware-as-a-service known as Cthulhu Stealer targets macOS users, first luring them in by imitating legitimate soft...
Preparing for ransomware threats in 2025: What you need to know
As ransomware continues to evolve, so must the strategies used to combat it. This was the central theme in a recent webcast discussion ...