www.scmagazine.com Open in urlscan Pro
2606:4700:20::ac43:45e3  Public Scan

Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqzzQc2htNsyCu2YCnvnHgJoa2RkvPEUqWg2kKm3S2QxmauAL_CRVFUeOIr9AOn4zZwdx0kpt9...
Effective URL: https://www.scmagazine.com/?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cra-welcome&nbd=Wl5sY4sBF4BNJooY8rr...
Submission: On November 08 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="fs-9 my-4">
    <p>By clicking the Subscribe button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions" data-feathr-click-track="true" data-feathr-link-aids="[&quot;60071024bdb3f8d0470da8d6&quot;]">Terms and Conditions</a><span>
        and </span><a class="text-underline" href="/privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="[&quot;60071024bdb3f8d0470da8d6&quot;]">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Subscribe</button>
</form>

Text Content

Log inRegister
CISO Stories
Topics
Events
Podcasts
Research
Recognition
Leadership
About



CYBERSECURITY NEWS, AWARDS, WEBINARS, ESUMMITS, RESEARCH

ADVERTISEMENT




A $75M GLIMMER OF HOPE FOR STRUGGLING CYBERSECURITY STARTUPS

Simon HenderyNovember 8, 2023

After years of generous funding and inflated valuations, cybersecurity startups
are finding it harder to raise capital, but the best ones will still prosper,
VCs say.

THREAT INTELLIGENCE: EYES ON THE ENEMY

ADVERTISEMENT



PODCASTS

 * Threat Intelligence
   
   GROK, OKTA, LOONEY TUNABLES, HELLOKITTY, GOOTBOT, VEEAM, MORE NEWS AND JASON
   WOOD – SWN #340

 * Leadership
   
   VETERANS IMPACTING CYBERSECURITY – DAVID CROSS – CSP #147

 * Security Strategy, Plan, Budget
   
   SECURITY MONEY: THE INDEX IS REBOUNDING – BSW #327

 * Leadership
   
   SEC CHARGING SOLARWINDS IS A GAME CHANGER, FORCING US TO RETHINK CISO
   ACCOUNTABILITY – BSW #327

 * Application security
   
   SECURITY FROM A DEVELOPER’S PERSPECTIVE – JOSH GOLDBERG – ASW #262

RESOURCES

 * Identity
   
   KEY QUESTIONS TO ASK WHEN EVALUATING AN IDENTITY AND ACCESS SECURITY VENDOR

 * Identity
   
   ACCOUNT-OPENING SOLUTIONS OFFER STRONG RETURNS ON INVESTMENT

 * Leadership
   
   7-HOUR RECOVERY: HOW AN AMERICAN BUSINESS BEAT RANSOMWARE

 * Identity
   
   CHARGEBACK PROTECTION MARKET SET FOR EXPLOSIVE GROWTH

 * Penetration Testing
   
   WHAT PCI DSS 4.0 MEANS FOR PEN TESTERS


FEATURED

CONGRATULATIONS TO OUR 2023 SC MEDIA WOMEN IN IT SECURITY HONOREES


GET DAILY EMAIL UPDATES

SC Media's daily must-read of the most current and pressing daily news
Business Email

By clicking the Subscribe button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Subscribe


PERSPECTIVES

 * WHAT THE NEW ‘ILEAKAGE’ RESEARCH TELLS US ABOUT POTENTIAL SECURITY FLAWS IN
   APPLE ARM CHIPS 
   
   Richard Taylor
   
   November 8, 2023

 * UNDER CONSTRUCTION: BIDEN’S AI EXECUTIVE ORDER NEEDS A SOLID FOUNDATION
   
   Alison King
   
   November 7, 2023

 * FIVE ATTACK VECTORS THAT BUSINESSES SHOULD FOCUS ON IN THE WAKE OF THE
   ISRAEL-HAMAS WAR
   
   Jeremiah Fowler
   
   November 6, 2023

 * BIDEN’S AI EXECUTIVE ORDER: A SMALL STEP IN THE RIGHT DIRECTION
   
   Mike Britton
   
   November 3, 2023

 * HOW CARS HAVE BECOME THE BIGGEST THREAT TO PRIVACY  
   
   Konrad Fellmann
   
   November 2, 2023

More Perspectives


IN BRIEF

 * RANSOMWARE EXPLOITATION OF ATLASSIAN CONFLUENCE FLAW CONFIRMED
   
   SC Staff
   
   November 8, 2023

 * VEEAM ONE VULNERABILITIES ADDRESSED
   
   SC Staff
   
   November 8, 2023

 * RECENT 23ANDME BREACH TRIGGERS 2FA REQUIREMENT AMONG GENETIC TESTING FIRMS
   
   SC Staff
   
   November 8, 2023

 * CLOUD SECURITY WOES PREVALENT
   
   SC Staff
   
   November 8, 2023

 * CYBERSECURITY THREAT OF API AUTHORIZATIONS EXAMINED
   
   SC Staff
   
   November 8, 2023

More Briefs


MORE RESOURCES

 * CYBERSECURITY AWARENESS MONTH: BUILDING A USE POLICY FOR GENERATIVE AI
   
   George V. Hulme
   
   October 30, 2023

 * CYBERSECURITY AWARENESS MONTH: FOUR ACTIONS TO IMPROVE SECURITY HYGIENE
   
   George V. Hulme
   
   October 30, 2023

 * IAM OPTIMIZATION CHECKLIST
   
   Daniel Thomas
   
   October 24, 2023

 * RANSOMWARE ATTACKS ARE GETTING FASTER: HOW TO ADJUST INCIDENT RESPONSE PLANS
   ACCORDINGLY
   
   George V. Hulme
   
   October 23, 2023

 * RANSOMWARE GANGS TAKE LESS THAN A DAY TO BREACH MICROSOFT ACTIVE DIRECTORY.
   HERE’S WHAT TO DO
   
   George V. Hulme
   
   October 23, 2023

MORE RESOURCES
Security Strategy, Plan, Budget

ONLY 9% OF IT BUDGETS ARE DEDICATED TO SECURITY, AS DECREASED SPENDING EXPECTED

Steve ZurierNovember 8, 2023

New Vanta report on trust offers strategies to automate the most tedious tasks
and get security teams focused on their most strategic work.

Ransomware

SILENT RANSOM GROUP RAMPS UP CALLBACK PHISHING ATTACKS, FBI WARNS

Simon HenderyNovember 8, 2023

The FBI warns the gang is up to its old tricks, initiating ransomware attacks by
executing a complex but effective social-engineering scam.

Malware

NORTH KOREA-LINKED BLUENOROFF’S MACOS MALWARE VARIANT TARGETS FINANCIAL FIRMS

Steve ZurierNovember 7, 2023

Jamf says North Korean subgroup of the financially motivated Lazarus Group
targets specific users the threat actors believe have access to cryptocurrency.


Patch/Configuration Management

ACTIVELY EXPLOITED ATLASSIAN CONFLUENCE BUG ELEVATED TO MAXIMUM SEVERITY RATING

Simon HenderyNovember 7, 2023

Cerber ransomware attacks started over the weekend, just days after “critical
information” about the now-patched Atlassian Confluence vulnerability was posted
online.

Ransomware

NEW ‘GOOTBOT’ STRAIN OF GOOTLOADER MALWARE STOKES RANSOMWARE FEARS    

Steve ZurierNovember 6, 2023

Security researchers say this new strain of Gootloader leverages "stealthier"
SEO-poisoning to trick people who regularly use contracts, legal forms, and
other business documents.

IAM Technologies

OKTA BREACH LINKED TO EMPLOYEE’S PERSONAL GOOGLE ACCOUNT

Simon HenderyNovember 6, 2023

A previously disclosed breach of Okta's backend support case management system
allowed attackers to access files relating to 134 customers.


Cloud Security

EXPLOITED ‘LOONEY TUNABLES’ LINUX PRIVILEGED ESCALATION BUG LINKED TO KINSING
THREAT ACTOR

Steve ZurierNovember 3, 2023

Aqua Nautilus researchers claim they’ve observed the first documented exploit of
the "Looney Tunables" vulnerability by threat actor Kinsing.

Ransomware

RANSOMWARE GANG HELLOKITTY QUICKLY EXPLOITS CRITICAL APACHE ACTIVEMQ BUG

Simon HenderyNovember 3, 2023

The ransomware gang was spotted exploiting the vulnerability just two days after
Apache disclosed the flaw and released patched versions of the software. 

Load More


EVENTS

 * 
   eSummit
   
   SURVIVE OR SINK? THE BEFORE, DURING AND AFTER OF A RANSOMWARE ATTACK
   
   Tue Nov 14 - Wed Nov 15

 * 
   Cybercast
   
   RANSOMWARE: DESIGNING A STRATEGIC DETECTION AND RESPONSE PLAN
   
   Thu Nov 16

 * 
   eSummit
   
   CYBER THREAT INTELLIGENCE: MAKING SENSE OF A CHAOTIC WORLD
   
   Tue Dec 5 - Wed Dec 6

 * 
   Cybercast
   
   IMPLEMENTING A PRACTICAL APPSEC PROGRAM: EXPERT INSIGHTS ON STRATEGY &
   EXECUTION
   
   Tue Dec 5

 * 
   Cybercast
   
   NETWORK SECURITY IN 2024: WHAT HAS CHANGED IN THE ERA OF CLOUD COMPUTING, AND
   HOW TO ADAPT
   
   Wed Dec 6

ADVERTISEMENT



X




--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.