SC Media(@SCMagazine) 's Twitter Profile Photo

A critical vulnerability in Atlassian Confluence Data Center and Server was used to deploy a Linux variant of Cerber ransomware, Cado researchers revealed.

bit.ly/442TBcV

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

The fast adoption of raises a pressing question, says Seemplicity's Yoran Sirkis in this commentary: How do we harness the power of this new technology while safeguarding our growing attack surface?

bit.ly/43ZptPW

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

A critical vulnerability in Atlassian Confluence Data Center and Server was used to deploy a Linux variant of Cerber ransomware, Cado researchers revealed.

bit.ly/442TBcV

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

Phone numbers and other data belonging to users of Cisco Duo’s identity authentication service have been stolen following the breach of a third-party telephony supplier.
bit.ly/3vLxco2

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

Threat actors appear to be using stolen employee records from telephone companies to entice workers to perform illegal SIM swaps in return for quick cash. bit.ly/4aVMHZb

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

Hackers stole health records belonging to more than half a million individuals from a non-profit Wisconsin healthcare provider after their attempt to encrypt the organization’s systems failed.

bit.ly/49AvsvF

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

A Fortinet FortiClientLinux critical vulnerability could allow remote code execution (RCE) by an unauthenticated attacker, Fortinet disclosed. bit.ly/3TXfIga

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

.Microsoft discovered a new method to jailbreak large language model (LLM) artificial intelligence ( ) tools and shared its ongoing efforts to improve LLM safety and security. bit.ly/3TYcAkk

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

Two Microsoft SharePoint flaws have been observed that could potentially let attackers circumvent audit logs and avoid triggering downloads and then exfiltrate SharePoint data. security
bit.ly/43QrGwG

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

AI-generated malware may have been used in a recent campaign to spread the Rhadamanthys infostealer, Proofpoint researchers revealed.
bit.ly/49yX7wW

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

Zero Trust Network Access mitigates the risks associated with vulnerabilities by verifying the identity and trustworthiness of users and devices before granting access to resources, says Zero Networks' Sagie Dulce in this commentary.

bit.ly/4aRqNXb

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

.Microsoft discovered a new method to jailbreak large language model (LLM) artificial intelligence ( ) tools and shared its ongoing efforts to improve LLM safety and security. bit.ly/3TYcAkk

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

.Mandiant researchers have linked a cyberattack on a Texas water facility to Sandworm, a top Russian military-aligned threat group responsible for a decade of “disruptive and destructive” campaigns targeting Ukraine. bit.ly/4d1MLIK

account_circle
SC Media(@SCMagazine) 's Twitter Profile Photo

Threat actors appear to be using stolen employee records from telephone companies to entice workers to perform illegal SIM swaps in return for quick cash. bit.ly/4aVMHZb

account_circle