www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:3d7  Public Scan

Submitted URL: http://accounts.scmagazine.com/
Effective URL: https://www.scmagazine.com/
Submission: On January 10 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="fs-9 my-4">
    <p>By clicking the Subscribe button below, you agree to SC Media
      <a class="text-underline" href="/terms-and-conditions" data-feathr-click-track="true" data-feathr-link-aids="[null,&quot;60071024bdb3f8d0470da8d6&quot;]">Terms and Conditions</a><span> and
      </span><a class="text-underline" href="/privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="[null,&quot;60071024bdb3f8d0470da8d6&quot;]">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Subscribe</button>
</form>

Text Content

Log inRegister
Topics
Industry
Events
Podcasts
Research
Recognition
Leadership



CYBERSECURITY NEWS, AWARDS, WEBINARS, ESUMMITS, RESEARCH

ADVERTISEMENT




SC EVENTS

COMING SOON

 * eSummit
   
   PARTNER OR PROBLEM? SECURING THIRD-PARTY RELATIONS IN THE AGE OF SUPPLY CHAIN
   ATTACKS 
   
   Tue Jan 24 - Wed Jan 25

 * eSummit
   
   THREAT HUNTING ON STEROIDS: TIME TO DIG DEEPER
   
   Tue Feb 21 - Wed Feb 22

 * eSummit
   
   LEGITIMIZING ZERO TRUST: A BUZZWORD NO LONGER? 
   
   Tue Mar 21 - Wed Mar 22

More Events


WATCH


Threat intelligence

KEY LEARNINGS FROM 2022 AND THOUGHTS ON 2023


LISTEN


Managed services

EPISODE #2 OF CYBER FOR HIRE: BRUNSMAN ADVISORY GROUP'S JOSEPH EDWARD BRUNSMAN


IN THE NEWS

 * TREND MICRO CREATES CTONE, A NEW SUBSIDIARY FOCUSED ON 5G SECURITY
   
   Steve Zurier
   
   January 9, 2023

 * AWS SAYS IT WILL NOW ENCRYPT S3 BUCKETS BY DEFAULT
   
   Steve Zurier
   
   January 9, 2023

 * SUPREME COURT DENIES NSO GROUP APPEAL; META’S SPYWARE CLAIMS LAWSUIT CAN
   PROCEED
   
   Jessica Davis
   
   January 9, 2023

 * TRUSTWAVE REPORT SAYS BUSINESSES NEED TO GET MORE PROACTIVE ABOUT RANSOMWARE
   
   Steve Zurier
   
   January 6, 2023

 * ANDROID SPYWARE VARIANT TARGETING BANKING INFORMATION
   
   Stephen Weigand
   
   January 6, 2023

More News


RESOURCES

 * MDR: WHAT TO KNOW BEFORE YOU BUY, PART 2
   
   Daniel Thomas
   
   January 9, 2023

 * MDR: WHAT TO KNOW BEFORE YOU BUY, PART 1
   
   Daniel Thomas
   
   January 9, 2023

 * VULNERABILITY MANAGEMENT STRATEGIES EVOLVE IN 2022 AS SUPPLY CHAIN RISK GROWS
   
   Bill Brenner
   
   December 30, 2022

 * CYBERWAR IN UKRAINE, RANSOMWARE FEARS DRIVE 2022 SURGE IN DEMAND FOR THREAT
   INTELLIGENCE TOOLS
   
   Bill Brenner
   
   December 29, 2022

 * NEW THREATS EXPAND USE CASES FOR XDR THREAT DETECTION IN 2022
   
   Bill Brenner
   
   December 29, 2022

MORE RESOURCES


PERSPECTIVES

 * ASK THESE THREE QUESTIONS TO PREPARE FOR THE NEXT CYBERATTACK
   
   Carl Wright
   
   January 10, 2023

 * 2023: THE YEAR CISOS AND DPOS WILL STOP MAKING ASSUMPTIONS
   
   Stephen Cavey
   
   January 9, 2023

 * FOUR WAYS TO REDUCE THE RISK OF THIRD-PARTY BREACHES
   
   Stu Sjouwerman
   
   January 6, 2023

 * MICROSOFT MACROS: THE SNEAKY THREAT LOOMING IN FILES
   
   Aviv Grafi
   
   January 5, 2023

 * LESSONS ON CLOUD SECURITY FROM THE ‘TWITTER WHISTLEBLOWER’
   
   Mark Shainman
   
   January 4, 2023

More Perspectives

A close-up view of the Telegram messaging app is seen on a smart phone on May
25, 2017 in London, England. SafeGuard Cyber Division Seven (D7) threat
intelligence team located and confirmed an instance where a company’s employees
had been targeted in a previously-known cryptocurrency impersonation scheme as
far back as July 2022. (Photo by Carl Court/Getty Images)

RESEARCH CONFIRMS THREAT ACTOR IMPERSONATING CRYPTOCURRENCY FIRM ON TELEGRAM

Menghan XiaoJanuary 10, 2023

A month after Microsoft revealed that a threat actor was targeting using
Telegram to connect with cryptocurrency VIPs and infect them with malware,
another firm has found additional evidence of malicious actors using tactics to
impersonate legitimate actors in the cryptocurrency space.

Critical infrastructure

THE RUSSIA-UKRAINE WAR HAS SOME RETHINKING THE ROLE OF OFFENSIVE CYBER
OPERATIONS IN ARMED CONFLICT

Derek B. JohnsonJanuary 9, 2023

Russia's experience of limited success in Ukraine has some U.S. observers
advising that we collectively pump the breaks on the idea that cyberspace is now
a fully-fledged domain of war.


Ransomware

HIVE CLAIMS STEALING CONSULATE HEALTH DATA; PROVIDER REPORTS VENDOR INCIDENT

Jessica DavisJanuary 9, 2023

This week’s breach roundup includes three instances of failing to timely report
data incidents and is led by a new Hive dark web posting of data allegedly
stolen from Consulate Health.

Application security

SOLARWINDS SHAREHOLDERS ASK DELAWARE SUPREME COURT TO REVIVE ORION BREACH
LAWSUIT

Menghan XiaoJanuary 6, 2023

In an opening brief filed Wednesday and obtained by SC Media, the shareholders
told the state high court that Delaware Vice Chancellor Sam Glasscock III’s
September ruling ending their case was wrongly decided.

Emerging technology

CYBERCRIMINALS ARE ALREADY USING CHATGPT TO OWN YOU

Derek B. JohnsonJanuary 6, 2023

Underground hacking forums are already awash in real-world examples of
cybercriminals attempting to use ChatGPT for malicious purposes.


Third-party risk

HEALTHCARE’S VENDOR PROBLEM SPURS MORE THAN DATA BREACHES — IT’S A PATIENT
SAFETY RISK

Jessica DavisJanuary 6, 2023

Vendors that offer healthcare providers services for things such as radiation
therapy, payroll, and even laundry are critical parts of care delivery. What
happens when they go down?

Asset Management

END TO WINDOWS 8.1 SUPPORT WILL CREATE ASSET MANAGEMENT HEADACHES FOR
SPECIALIZED INDUSTRIES

Steve ZurierJanuary 5, 2023

The looming deadline for Microsoft to stop supporting Windows 8 presents some
serious issues for many small businesses, government agencies, and medical
facilities, experts told SC Media.

Load More
Careers

INFOSEC COMMUNITY CULTURE & THE MIGRATION TO MASTODON – JERRY BELL – ESW #301


GET DAILY EMAIL UPDATES

SC Media's daily must-read of the most current and pressing daily news
Business Email

By clicking the Subscribe button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Subscribe

ADVERTISEMENT



X



--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies