www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::ac43:45e3
Public Scan
Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqzzQc2htNsyCu2YCnvnHgJoa2RkvPEUqWg2kKm3S2QxmauAL_CRVFUeOIr9AOn4zZwdx0kpt9...
Effective URL: https://www.scmagazine.com/?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cra-welcome&nbd=Wl5sY4sBF4BNJooY8rr...
Submission: On November 08 via api from US — Scanned from DE
Effective URL: https://www.scmagazine.com/?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cra-welcome&nbd=Wl5sY4sBF4BNJooY8rr...
Submission: On November 08 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="w-100" scmag-registration="set">
<div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="fs-9 my-4">
<p>By clicking the Subscribe button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions" data-feathr-click-track="true" data-feathr-link-aids="["60071024bdb3f8d0470da8d6"]">Terms and Conditions</a><span>
and </span><a class="text-underline" href="/privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="["60071024bdb3f8d0470da8d6"]">Privacy Policy</a>.</p>
</div><button type="submit" class="btn btn-primary">Subscribe</button>
</form>
Text Content
Log inRegister CISO Stories Topics Events Podcasts Research Recognition Leadership About CYBERSECURITY NEWS, AWARDS, WEBINARS, ESUMMITS, RESEARCH ADVERTISEMENT A $75M GLIMMER OF HOPE FOR STRUGGLING CYBERSECURITY STARTUPS Simon HenderyNovember 8, 2023 After years of generous funding and inflated valuations, cybersecurity startups are finding it harder to raise capital, but the best ones will still prosper, VCs say. THREAT INTELLIGENCE: EYES ON THE ENEMY ADVERTISEMENT PODCASTS * Threat Intelligence GROK, OKTA, LOONEY TUNABLES, HELLOKITTY, GOOTBOT, VEEAM, MORE NEWS AND JASON WOOD – SWN #340 * Leadership VETERANS IMPACTING CYBERSECURITY – DAVID CROSS – CSP #147 * Security Strategy, Plan, Budget SECURITY MONEY: THE INDEX IS REBOUNDING – BSW #327 * Leadership SEC CHARGING SOLARWINDS IS A GAME CHANGER, FORCING US TO RETHINK CISO ACCOUNTABILITY – BSW #327 * Application security SECURITY FROM A DEVELOPER’S PERSPECTIVE – JOSH GOLDBERG – ASW #262 RESOURCES * Identity KEY QUESTIONS TO ASK WHEN EVALUATING AN IDENTITY AND ACCESS SECURITY VENDOR * Identity ACCOUNT-OPENING SOLUTIONS OFFER STRONG RETURNS ON INVESTMENT * Leadership 7-HOUR RECOVERY: HOW AN AMERICAN BUSINESS BEAT RANSOMWARE * Identity CHARGEBACK PROTECTION MARKET SET FOR EXPLOSIVE GROWTH * Penetration Testing WHAT PCI DSS 4.0 MEANS FOR PEN TESTERS FEATURED CONGRATULATIONS TO OUR 2023 SC MEDIA WOMEN IN IT SECURITY HONOREES GET DAILY EMAIL UPDATES SC Media's daily must-read of the most current and pressing daily news Business Email By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy. Subscribe PERSPECTIVES * WHAT THE NEW ‘ILEAKAGE’ RESEARCH TELLS US ABOUT POTENTIAL SECURITY FLAWS IN APPLE ARM CHIPS Richard Taylor November 8, 2023 * UNDER CONSTRUCTION: BIDEN’S AI EXECUTIVE ORDER NEEDS A SOLID FOUNDATION Alison King November 7, 2023 * FIVE ATTACK VECTORS THAT BUSINESSES SHOULD FOCUS ON IN THE WAKE OF THE ISRAEL-HAMAS WAR Jeremiah Fowler November 6, 2023 * BIDEN’S AI EXECUTIVE ORDER: A SMALL STEP IN THE RIGHT DIRECTION Mike Britton November 3, 2023 * HOW CARS HAVE BECOME THE BIGGEST THREAT TO PRIVACY Konrad Fellmann November 2, 2023 More Perspectives IN BRIEF * RANSOMWARE EXPLOITATION OF ATLASSIAN CONFLUENCE FLAW CONFIRMED SC Staff November 8, 2023 * VEEAM ONE VULNERABILITIES ADDRESSED SC Staff November 8, 2023 * RECENT 23ANDME BREACH TRIGGERS 2FA REQUIREMENT AMONG GENETIC TESTING FIRMS SC Staff November 8, 2023 * CLOUD SECURITY WOES PREVALENT SC Staff November 8, 2023 * CYBERSECURITY THREAT OF API AUTHORIZATIONS EXAMINED SC Staff November 8, 2023 More Briefs MORE RESOURCES * CYBERSECURITY AWARENESS MONTH: BUILDING A USE POLICY FOR GENERATIVE AI George V. Hulme October 30, 2023 * CYBERSECURITY AWARENESS MONTH: FOUR ACTIONS TO IMPROVE SECURITY HYGIENE George V. Hulme October 30, 2023 * IAM OPTIMIZATION CHECKLIST Daniel Thomas October 24, 2023 * RANSOMWARE ATTACKS ARE GETTING FASTER: HOW TO ADJUST INCIDENT RESPONSE PLANS ACCORDINGLY George V. Hulme October 23, 2023 * RANSOMWARE GANGS TAKE LESS THAN A DAY TO BREACH MICROSOFT ACTIVE DIRECTORY. HERE’S WHAT TO DO George V. Hulme October 23, 2023 MORE RESOURCES Security Strategy, Plan, Budget ONLY 9% OF IT BUDGETS ARE DEDICATED TO SECURITY, AS DECREASED SPENDING EXPECTED Steve ZurierNovember 8, 2023 New Vanta report on trust offers strategies to automate the most tedious tasks and get security teams focused on their most strategic work. Ransomware SILENT RANSOM GROUP RAMPS UP CALLBACK PHISHING ATTACKS, FBI WARNS Simon HenderyNovember 8, 2023 The FBI warns the gang is up to its old tricks, initiating ransomware attacks by executing a complex but effective social-engineering scam. Malware NORTH KOREA-LINKED BLUENOROFF’S MACOS MALWARE VARIANT TARGETS FINANCIAL FIRMS Steve ZurierNovember 7, 2023 Jamf says North Korean subgroup of the financially motivated Lazarus Group targets specific users the threat actors believe have access to cryptocurrency. Patch/Configuration Management ACTIVELY EXPLOITED ATLASSIAN CONFLUENCE BUG ELEVATED TO MAXIMUM SEVERITY RATING Simon HenderyNovember 7, 2023 Cerber ransomware attacks started over the weekend, just days after “critical information” about the now-patched Atlassian Confluence vulnerability was posted online. Ransomware NEW ‘GOOTBOT’ STRAIN OF GOOTLOADER MALWARE STOKES RANSOMWARE FEARS Steve ZurierNovember 6, 2023 Security researchers say this new strain of Gootloader leverages "stealthier" SEO-poisoning to trick people who regularly use contracts, legal forms, and other business documents. IAM Technologies OKTA BREACH LINKED TO EMPLOYEE’S PERSONAL GOOGLE ACCOUNT Simon HenderyNovember 6, 2023 A previously disclosed breach of Okta's backend support case management system allowed attackers to access files relating to 134 customers. Cloud Security EXPLOITED ‘LOONEY TUNABLES’ LINUX PRIVILEGED ESCALATION BUG LINKED TO KINSING THREAT ACTOR Steve ZurierNovember 3, 2023 Aqua Nautilus researchers claim they’ve observed the first documented exploit of the "Looney Tunables" vulnerability by threat actor Kinsing. Ransomware RANSOMWARE GANG HELLOKITTY QUICKLY EXPLOITS CRITICAL APACHE ACTIVEMQ BUG Simon HenderyNovember 3, 2023 The ransomware gang was spotted exploiting the vulnerability just two days after Apache disclosed the flaw and released patched versions of the software. Load More EVENTS * eSummit SURVIVE OR SINK? THE BEFORE, DURING AND AFTER OF A RANSOMWARE ATTACK Tue Nov 14 - Wed Nov 15 * Cybercast RANSOMWARE: DESIGNING A STRATEGIC DETECTION AND RESPONSE PLAN Thu Nov 16 * eSummit CYBER THREAT INTELLIGENCE: MAKING SENSE OF A CHAOTIC WORLD Tue Dec 5 - Wed Dec 6 * Cybercast IMPLEMENTING A PRACTICAL APPSEC PROGRAM: EXPERT INSIGHTS ON STRATEGY & EXECUTION Tue Dec 5 * Cybercast NETWORK SECURITY IN 2024: WHAT HAS CHANGED IN THE ERA OF CLOUD COMPUTING, AND HOW TO ADAPT Wed Dec 6 ADVERTISEMENT X -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.