SC Media

SC Media

Publication
0 followers

Enterprise cybersecurity, risk, and governance for CISOs/CIOs.

Mastodon Hit by DDoS Attack, Disrupting Flagship Server
NewsApr 21, 2026

Mastodon Hit by DDoS Attack, Disrupting Flagship Server

Mastodon’s flagship instance, mastodon.social, was hit by a distributed denial‑of‑service (DDoS) attack on Monday, April 21, 2026, causing intermittent outages for users. The platform confirmed the attack at 7 a.m. ET and deployed mitigation measures by 9:05 a.m., restoring access though some instability...

By SC Media
Making AI Actually Work in the Enterprise and More RSAC Conference 2026 Interviews - Aamir Lakhani, Camellia Chan, Ely Abramovitch,...
NewsApr 20, 2026

Making AI Actually Work in the Enterprise and More RSAC Conference 2026 Interviews - Aamir Lakhani, Camellia Chan, Ely Abramovitch,...

The episode explores why many enterprise AI initiatives stumble, emphasizing the need for security‑by‑design and clear governance. Fortinet’s 2026 Global Threat Landscape Report highlights a sharp rise in AI‑enabled cybercrime, prompting vendors like X‑PHY to deliver hardware‑enforced safeguards for AI...

By SC Media
ShinyHunters Alleges Kemper Corporation Hack, Exposes over 13M Records
NewsApr 17, 2026

ShinyHunters Alleges Kemper Corporation Hack, Exposes over 13M Records

Kemper Corporation disclosed that the ShinyHunters hacking group claimed to have exfiltrated more than 29 GB of data from its Salesforce environment, leaking over 13 million records. The stolen files span SharePoint corporate documents, Azure-stored employee PII, Salesforce employee data, and Stripe...

By SC Media
GitHub User Attachments Abused to Spread Novel Infostealer
NewsApr 17, 2026

GitHub User Attachments Abused to Spread Novel Infostealer

Cyderes researchers uncovered a new malware campaign that abuses GitHub user‑attachment links to deliver ZIP archives containing a custom loader called Direct‑Sys and the CGrabber infostealer. The loader sideloads a Microsoft‑signed DLL, performs three anti‑sandbox checks, and uses direct syscalls...

By SC Media
Grinex Crypto Exchange Halts Operations After $13.7 Million Hack
NewsApr 17, 2026

Grinex Crypto Exchange Halts Operations After $13.7 Million Hack

Kyrgyzstan‑based crypto exchange Grinex suspended operations after a $13.7 million hack that primarily affected Russian users trading crypto‑ruble pairs. The theft was executed via TRON and Ethereum addresses and laundered through the SunSwap decentralized exchange. Grinex, which succeeded the U.S.–sanctioned Russian...

By SC Media
AI as the Defender: Reinventing Proactive Cybersecurity Through Intelligent Automation
NewsApr 16, 2026

AI as the Defender: Reinventing Proactive Cybersecurity Through Intelligent Automation

Artificial intelligence is reshaping cybersecurity by acting as a force multiplier rather than replacing human analysts. Tenable and peers define "AI for security" as the use of machine learning to automate analysis, amplify detection and improve decision‑making, while "security for...

By SC Media
Google Cloud Storage Weaponized for Clandestine Remcos RAT Delivery
NewsApr 16, 2026

Google Cloud Storage Weaponized for Clandestine Remcos RAT Delivery

Threat actors are weaponizing Google Cloud Storage to host phishing pages that silently deliver the Remcos remote‑access trojan. Emails direct victims to fake Google Drive login screens on the legitimate storage.googleapis.com domain, harvesting credentials and deploying a JavaScript loader. The...

By SC Media
Extensive MuddyWater-Like Attack Campaign Against Middle Eastern Critical Infrastructure Detailed
NewsApr 16, 2026

Extensive MuddyWater-Like Attack Campaign Against Middle Eastern Critical Infrastructure Detailed

A threat group mirroring Iran‑backed MuddyWater launched a large‑scale campaign against Middle Eastern critical‑infrastructure entities beginning in February. Exploiting five vulnerabilities—including SmarterMail (CVE‑2025‑52691) and Langflow (CVE‑2025‑34291)—the actors breached more than 12,000 internet‑exposed systems and used brute‑force attacks on Outlook Web...

By SC Media
Over 25K Systems Exposed by Adware App to Supply Chain Compromise
NewsApr 15, 2026

Over 25K Systems Exposed by Adware App to Supply Chain Compromise

Dragon Boss Solutions’ ad‑ware platform inadvertently exposed more than 25,000 systems after an insecure software‑update channel was discovered. Threat actors could purchase a signed payload for about $10 and push malicious code with SYSTEM privileges. Huntress identified communications from 23,565 IP addresses,...

By SC Media
WBA Guidelines Target Rogue Access Points and Credential Theft
NewsApr 15, 2026

WBA Guidelines Target Rogue Access Points and Credential Theft

The Wireless Broadband Alliance (WBA) released a Wi‑Fi Security Guidelines framework to standardize protection across public, enterprise, IoT, and roaming networks. The document mandates mutual certificate‑based authentication, WPA3‑Enterprise with Protected Management Frames, and encrypted RADIUS traffic to thwart rogue access...

By SC Media
CIA to Deploy AI Coworkers in Analyst Workflows
NewsApr 15, 2026

CIA to Deploy AI Coworkers in Analyst Workflows

The CIA is embedding artificial‑intelligence “coworkers” into its analytical workflows, beginning as drafting assistants and trend‑spotters and aiming to become autonomous mission partners within the next decade. Deputy Director Michael Ellis announced the agency’s first AI‑generated intelligence report and disclosed...

By SC Media
KnowBe4 Debuts Guardrails for Autonomous AI Agents
NewsApr 15, 2026

KnowBe4 Debuts Guardrails for Autonomous AI Agents

KnowBe4 has introduced Agent Risk Manager, a real‑time monitoring and governance layer designed to police autonomous AI agents operating across enterprise environments. The solution adds behavioral guardrails to block threats such as unauthorized data exposure, prompt‑injection jailbreaks, and runaway compute...

By SC Media
Execution Gap Plagues Enterprise Digital Resilience
NewsApr 15, 2026

Execution Gap Plagues Enterprise Digital Resilience

A new global study by Economist Impact and Telstra International finds that only one in four enterprises successfully execute major disruption response plans. The gap is attributed more to fractured governance and weak ecosystem coordination than to technology shortfalls. About...

By SC Media
Nearly Half of March Ransomware Attacks in Tied to Just 3 Groups
NewsApr 13, 2026

Nearly Half of March Ransomware Attacks in Tied to Just 3 Groups

Check Point researchers reported 672 ransomware incidents in March 2026, with three groups responsible for nearly half of the attacks. Qilin alone accounted for 20% of incidents, Akira for 12%, and Dragonforce RaaS for 8%. The analysis highlighted attackers’ refined...

By SC Media
MuddyWater Pays for Russian CastleRAT Malware
NewsApr 13, 2026

MuddyWater Pays for Russian CastleRAT Malware

Iranian state‑sponsored group MuddyWater has become a paying customer of a Russian malware‑as‑a‑service (MaaS) platform, using the CastleRAT tool in a new campaign called “ChainShell.” The operation leverages a misconfigured C2 server, an Ethereum‑based smart contract for address resolution, and...

By SC Media
We Catch up on the News, Including AI Vuln Hunting; Also More RSAC Interviews! - Mark Lambert, Samuel Hassine, John...
NewsApr 13, 2026

We Catch up on the News, Including AI Vuln Hunting; Also More RSAC Interviews! - Mark Lambert, Samuel Hassine, John...

ArmorCode unveiled its AI Exposure Management (AIEM) solution on the Agentic AI Platform, giving enterprises real‑time visibility into AI usage, ownership, and risk across heterogeneous environments. The launch coincides with the release of the 2026 State of AI Risk Management...

By SC Media
US Treasury to Offer Free Cybersecurity Intelligence to Crypto Firms
NewsApr 10, 2026

US Treasury to Offer Free Cybersecurity Intelligence to Crypto Firms

The U.S. Treasury’s Office of Cybersecurity and Critical Infrastructure Protection announced a new initiative that will provide cryptocurrency firms with free access to the same cyber threat intelligence shared with traditional banks. Eligible digital‑asset companies and industry groups must meet...

By SC Media
Hacker Faux Pas Uncloaks North Korean IT Worker Scheme
NewsApr 10, 2026

Hacker Faux Pas Uncloaks North Korean IT Worker Scheme

A hacker unintentionally ran infostealer malware on their own system, exposing a North Korean IT‑worker scam. The breach leaked data from a state‑run payment server, including 390 accounts, chat logs and cryptocurrency transaction details. Independent analyst ZachXBT estimates the operation...

By SC Media
Report: US Accounts for Most PLCs Subjected to Iranian Targeting
NewsApr 10, 2026

Report: US Accounts for Most PLCs Subjected to Iranian Targeting

A CyberScoop report finds that nearly 3,900 of the 5,219 internet‑exposed Rockwell Automation/Allen‑Bradley programmable logic controllers (PLCs) used in critical‑infrastructure are located in the United States, representing about 75% of the total. Roughly half of these vulnerable devices are linked...

By SC Media
Global Crypto Scam Disrupted, $12 Million Recovered in Operation Atlantic
NewsApr 10, 2026

Global Crypto Scam Disrupted, $12 Million Recovered in Operation Atlantic

Law enforcement agencies from the United States, United Kingdom and Canada dismantled a trans‑national cryptocurrency “pig‑butchering” scam in a week‑long effort dubbed Operation Atlantic. The operation froze $12 million and returned it to more than 3,000 victims, while identifying over 20,000...

By SC Media
Cybercriminals Use Emojis to Evade Detection, Flashpoint Warns
NewsApr 9, 2026

Cybercriminals Use Emojis to Evade Detection, Flashpoint Warns

Flashpoint’s latest threat‑intelligence report reveals cybercriminals are swapping traditional fraud‑related keywords with emojis to slip past security filters. By mapping emojis to concepts such as credit cards, banks, credentials, and malware, threat actors make automated monitoring far less effective. The...

By SC Media
Hack-for-Hire Group Targets MENA Journalists and Officials
NewsApr 9, 2026

Hack-for-Hire Group Targets MENA Journalists and Officials

A hack‑for‑hire group has been uncovered running a multi‑year espionage campaign against journalists, activists and government officials across the Middle East and North Africa. The attackers used phishing to steal Apple ID credentials and access iCloud backups, while deploying Android spyware...

By SC Media
Feds Grade Themselves High Despite Legacy Gaps
NewsApr 8, 2026

Feds Grade Themselves High Despite Legacy Gaps

A new EY survey shows 85 % of federal agency leaders rate their cybersecurity posture as an “A” or “B,” even though only one‑in‑five have completed a full migration to modern, secure platforms. Roughly half of AI‑driven defense projects are still...

By SC Media
Malaysia Faces Structural Shift in Cyber Threats
NewsApr 8, 2026

Malaysia Faces Structural Shift in Cyber Threats

Malaysia's cyber threat landscape is undergoing a structural shift as rapid digitization outpaces defenses. China‑linked APT groups such as APT41 and Mustang Panda are probing semiconductor and government networks, while financially motivated actors like Lazarus Group and FIN7 target banks...

By SC Media
Olympics Offer IR Lessons for Everyday Firms
NewsApr 8, 2026

Olympics Offer IR Lessons for Everyday Firms

The Milan‑Cortina Winter Olympics served as a live cyber‑stress test, exposing a 180% surge in DDoS attacks and coordinated phishing attempts. CISA officials highlighted that the same tactics used against the Games will soon target the FIFA World Cup, underscoring...

By SC Media
ComfyUI Instances Hijacked for Cryptomining and Proxy Botnet
NewsApr 8, 2026

ComfyUI Instances Hijacked for Cryptomining and Proxy Botnet

A new campaign is hijacking publicly exposed ComfyUI instances—an open‑source UI for stable diffusion models—to run illicit cryptocurrency mining and proxy botnet operations. Threat actors scan cloud IP ranges with a custom Python tool, exploiting unauthenticated deployments to execute malicious...

By SC Media
Novel ResokerRAT Malware Exploits Telegram API to Target Windows Systems
NewsApr 7, 2026

Novel ResokerRAT Malware Exploits Telegram API to Target Windows Systems

A new remote access trojan named ResokerRAT is targeting Windows computers by leveraging the Telegram Bot API for command‑and‑control. The malware creates a mutex to guarantee only one instance runs, then uses ShellExecuteEx to relaunch with elevated privileges while terminating...

By SC Media
SparkCat Malware Returns on App Stores, Targeting Cryptocurrency Users
NewsApr 6, 2026

SparkCat Malware Returns on App Stores, Targeting Cryptocurrency Users

A new SparkCat variant has reappeared on both the Apple App Store and Google Play, masquerading as benign enterprise messenger and food‑delivery applications. The trojan employs optical character recognition to scan photo libraries for cryptocurrency wallet recovery phrases, exfiltrating any...

By SC Media
Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport
NewsApr 2, 2026

Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport

Nasir Security, a hacktivist group linked to Iran, claimed to have stolen a large data set from Dubai International Airport after a months‑long intrusion. The breach includes passport photos of American, Arab and Emirati travelers, as well as luggage and...

By SC Media
Report Sheds More Light on Phantom Stealer
NewsApr 1, 2026

Report Sheds More Light on Phantom Stealer

A multi‑wave phishing campaign targeting European manufacturing, technology and logistics firms deployed the .NET‑based Phantom Stealer, bundled with a crypter and remote‑access tool. The attackers sent spoofed emails lacking DKIM signatures and failing SPF checks, attaching either a malicious executable...

By SC Media
Widespread Microsoft 365 Account Compromise Sought by Iran-Linked Hackers
NewsApr 1, 2026

Widespread Microsoft 365 Account Compromise Sought by Iran-Linked Hackers

Iran‑linked threat groups have compromised Microsoft 365 accounts across more than 300 Israeli organizations, 25 firms in the United Arab Emirates, and a limited set of targets in the United States, Saudi Arabia and Europe. The campaign began in early March with...

By SC Media
Joint Offering Combines CrowdStrike's Falcon with HCLTech's AI Force
NewsApr 1, 2026

Joint Offering Combines CrowdStrike's Falcon with HCLTech's AI Force

CrowdStrike and HCLTech have deepened their alliance by launching a continuous threat exposure management service that merges CrowdStrike’s Falcon platform with HCLTech’s VERITY framework and AI Force. The solution delivers real‑time visibility, AI‑driven insights, and automated remediation across endpoints, cloud, identity,...

By SC Media
Resemble AI Unveils Deepfake Detection Tools Amid Synthetic Media Surge
NewsApr 1, 2026

Resemble AI Unveils Deepfake Detection Tools Amid Synthetic Media Surge

Resemble AI released a deepfake threat report and two free detection tools—a Chrome extension that scans images, video and audio, and an X bot that lets users verify suspicious posts without leaving the platform. The company also added enterprise features...

By SC Media
Censys Gets $70M to Scale Internet Intelligence Platform
NewsApr 1, 2026

Censys Gets $70M to Scale Internet Intelligence Platform

Censys announced a $70 million financing package, comprising a $40 million Series D equity round led by Morgan Stanley Expansion Capital and $30 million of debt. The funding lifts the company’s total venture capital to over $149 million. Censys provides a continuously refreshed global map...

By SC Media
Venom Stealer MaaS Handles Attacks From ClickFix to Crypto Theft
NewsApr 1, 2026

Venom Stealer MaaS Handles Attacks From ClickFix to Crypto Theft

Venom Stealer, a new malware‑as‑a‑service, enables cybercriminals to launch ClickFix attacks that harvest credentials and cryptocurrency wallets. The service is priced at $250 per month or $1,800 for a lifetime license and includes four Windows and macOS phishing templates. Its...

By SC Media
US Bounty on Iranian Hackers Reissued
NewsMar 31, 2026

US Bounty on Iranian Hackers Reissued

The U.S. State Department has reissued a $10 million bounty for information on Iranian threat groups Handala and Parsian Afzar Rayan Borna. The reward follows the FBI’s confirmation that Handala breached Director Kash Patel’s personal email and earlier disclosures of compromised...

By SC Media
SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1
NewsMar 27, 2026

SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1

At RSAC 2026, Reach Security’s CEO Garrett Hamilton announced the company’s win of the SC Awards’ Best Continuous Threat Exposure Management (CTEM) Solution. The platform continuously identifies, prioritizes, and remediates real‑world risk by focusing on misconfigurations, configuration drift, and control‑level exposure...

By SC Media
Scanning The Internet with Linux Tools - PSW #919
NewsMar 26, 2026

Scanning The Internet with Linux Tools - PSW #919

The latest PSW #919 episode walks listeners through a Linux‑centric toolkit for internet‑scale scanning, emphasizing network‑edge visibility. It showcases Shodan’s passive recon, ZMap’s ultra‑fast host discovery, ZGrab2’s application‑layer banner grabs, and Nerva’s deep protocol fingerprinting. Sample results are processed with Claude Code,...

By SC Media
Beyond IOCs: A Framework for High-Impact Cyber Threat Intelligence - Samuel Hassine - RSAC26 #3
NewsMar 25, 2026

Beyond IOCs: A Framework for High-Impact Cyber Threat Intelligence - Samuel Hassine - RSAC26 #3

Samuel Hassine, CEO of Filigran, outlined a shift from reactive indicator‑of‑compromise (IOC) alerts to a business‑focused Continuous Threat Exposure Management (CTEM) framework. He emphasized unifying threat intelligence with adversarial attack simulation using platforms like OpenCTI to drive measurable risk reduction....

By SC Media
TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package
NewsMar 25, 2026

TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package

Open‑source Python library LiteLLM was compromised by the TeamPCP threat group, which uploaded malicious versions to PyPI that have since been removed. The packages deployed a three‑stage intrusion: credential harvesting, a Kubernetes lateral‑movement toolkit, and a persistent systemd backdoor. Endor...

By SC Media
Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign
NewsMar 25, 2026

Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign

Cybercriminals have been running a tax‑season malvertising campaign since January 2026, hijacking Google Ads to serve fake W‑2 and W‑9 download pages that redirect to malicious ConnectWise ScreenConnect installers. The trojanized installers launch a trial instance, inject a multi‑stage crypter...

By SC Media
Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3
NewsMar 25, 2026

Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3

Fortinet’s FortiGuard Labs released its 2026 Global Threat Landscape Report, highlighting a sharp rise in AI‑enabled cybercrime. The report shows AI is accelerating attack techniques, from automated ransomware encryption to AI‑driven supply‑chain exploits. Aamir Lakhani, Fortinet’s Global Director of Threat Intelligence...

By SC Media
Agentic AI and the Future of Threat Intelligence Operations - Sachin Jade - RSAC26 #2
NewsMar 25, 2026

Agentic AI and the Future of Threat Intelligence Operations - Sachin Jade - RSAC26 #2

At RSA 2026, Cyware’s Chief Product Officer Sachin Jade unveiled the company’s Agentic Fabric, an AI‑driven platform that embeds specialized agents into threat‑intelligence, detection‑engineering, and response workflows. The discussion highlighted how raw threat data can be transformed into actionable insights through STIX/TAXII...

By SC Media
Internet-Exposed EoL Microsoft IIS Servers Remain Prevalent
NewsMar 24, 2026

Internet-Exposed EoL Microsoft IIS Servers Remain Prevalent

More than 511,000 Microsoft Internet Information Services (IIS) servers that have reached end‑of‑life remain exposed on the public internet, according to the Shadowserver Foundation. Nearly half of these servers have outlived Microsoft’s Extended Security Updates window, leaving them unpatched and...

By SC Media
Attack Handoff Times Plummet, Exploits Remain Leading Attack Vector
NewsMar 24, 2026

Attack Handoff Times Plummet, Exploits Remain Leading Attack Vector

The median time for attackers to hand off compromised networks fell dramatically to just 22 seconds in 2025, down from over eight hours in 2022, driven by tighter coordination and automation. Exploits continued to dominate initial infection, with CVE‑2025‑31324, CVE‑2025‑61882...

By SC Media
Iranian Cyberattacks Ahead of US, Israel Strikes Discovered
NewsMar 20, 2026

Iranian Cyberattacks Ahead of US, Israel Strikes Discovered

Iranian advanced persistent threat groups, notably MuddyWater, staged six CIDR blocks in September using an Estonian autonomous system, indicating pre‑operational cyber preparation six months before the February 28 U.S.–Israel missile strikes. The buildup was corroborated by Augur Security, which linked the...

By SC Media
New Speagle Malware Hijacks Cobra DocGuard for Data Theft
NewsMar 20, 2026

New Speagle Malware Hijacks Cobra DocGuard for Data Theft

Security researchers have uncovered a new malware strain called Speagle that subverts the legitimate document security platform Cobra DocGuard to steal data. The malware disguises exfiltration as normal client‑server traffic and uses a compromised DocGuard server for command‑and‑control. It selectively infects...

By SC Media
AI Is Now the Decisive Factor in Cyber Conflict
NewsMar 20, 2026

AI Is Now the Decisive Factor in Cyber Conflict

AI has become a decisive factor in cyber conflict, especially across the Asia‑Pacific region. Deep‑fake and generative AI have driven social‑engineering incidents up 53% year‑over‑year and fraud claims up 233%. By 2025, AI‑driven threats are projected to affect 56% of...

By SC Media
Fake Interactive Zoom Call Leads to Malicious ScreenConnect Download
NewsMar 20, 2026

Fake Interactive Zoom Call Leads to Malicious ScreenConnect Download

Security researchers discovered a novel phishing campaign that uses a fake, interactive Zoom call to trick users into downloading a malicious update. The lure relies on AI‑generated JavaScript to mimic a glitchy Zoom meeting, directing victims to a counterfeit Microsoft...

By SC Media