SC Media

SC Media

Publication
0 followers

Enterprise cybersecurity, risk, and governance for CISOs/CIOs.

Lack of CISA Leadership Amid DHS Shutdown Raises Risks, Cyber Pros Say
NewsMar 19, 2026

Lack of CISA Leadership Amid DHS Shutdown Raises Risks, Cyber Pros Say

The U.S. Cybersecurity and Infrastructure Security Agency is operating with roughly one‑third of its staff as the DHS shutdown sidelines 1,500 employees and leaves the agency without a permanent director. Despite the staffing squeeze, CISA continues to issue critical alerts—such...

By SC Media
Beast Ransomware’s Toolkit Revealed by Exposed Directory
NewsMar 19, 2026

Beast Ransomware’s Toolkit Revealed by Exposed Directory

Team Cymru uncovered an open directory linked to the Beast ransomware group that exposed the gang’s complete ransomware‑as‑a‑service toolkit. The leak reveals the use of common reconnaissance scanners, credential‑dumping utilities such as Mimikatz, lateral‑movement tools like PsExec and AnyDesk, and...

By SC Media
Novel Font-Rendering Attack Prevents AI Assistants From Detecting Illicit Code
NewsMar 18, 2026

Novel Font-Rendering Attack Prevents AI Assistants From Detecting Illicit Code

A new proof‑of‑concept font‑rendering attack embeds malicious commands in a webpage’s HTML using custom fonts, causing AI assistants to process hidden code while users see benign text. Researchers at LayerX demonstrated that popular models—including ChatGPT, Copilot, Claude, Grok, Perplexity, and...

By SC Media
Advanced Phishing Intrusion Against Security Firm Exec Detailed
NewsMar 17, 2026

Advanced Phishing Intrusion Against Security Firm Exec Detailed

Outpost24 disclosed a sophisticated phishing campaign that targeted a C‑suite executive using the newly emerged Kratos phishing‑as‑a‑service kit. The attackers sent a spoofed JP Morgan email containing a “review document” link that first redirected through Cisco Secure Web and Nylas, then...

By SC Media
KakaoTalk Weaponized in Konni Spear-Phishing Campaign
NewsMar 17, 2026

KakaoTalk Weaponized in Konni Spear-Phishing Campaign

North Korean APT group Konni weaponized South Korea's KakaoTalk in a sophisticated spear‑phishing campaign. The group sent emails posing as a lecturer on North Korean human‑rights issues, tricking recipients into running a malicious shortcut that installed remote‑access malware. After compromising...

By SC Media
Phishing Emails Target AI Defenses with Unique Obfuscation
NewsMar 17, 2026

Phishing Emails Target AI Defenses with Unique Obfuscation

Cybercriminals are deploying a new email obfuscation method to bypass NLP‑based phishing filters. The tactic inserts hundreds of line breaks and large blocks of benign graymail or random text after the malicious payload, diluting the malicious signal and inflating email...

By SC Media
Global Cybercrime Clampdown Disrupts over 45K Illicit IP Addresses
NewsMar 16, 2026

Global Cybercrime Clampdown Disrupts over 45K Illicit IP Addresses

Operation Synergia III, coordinated by Interpol, removed over 45,000 malicious IP addresses between July 2025 and January 2026, involving law‑enforcement agencies from 72 countries and private partners like Trend Micro and Group‑IB. The campaign also seized 212 servers, apprehended 94 individuals, and opened investigations into...

By SC Media
Instagram-Powered Iranian Influence Operation Against US Dismantled
NewsMar 12, 2026

Instagram-Powered Iranian Influence Operation Against US Dismantled

Meta announced the removal of nearly 300 Instagram and Facebook accounts linked to an Iranian influence operation that masqueraded as journalists and commentators. The fake personas collectively attracted about 41,000 followers before disseminating anti‑U.S. and anti‑Israel political messages. Engagement on...

By SC Media
Development of Coruna iOS Exploit Kit Pinned on US Military Contractor
NewsMar 11, 2026

Development of Coruna iOS Exploit Kit Pinned on US Military Contractor

U.S. defense contractor L3Harris, through its Trenchant surveillance‑tech division, was identified as a developer of the Coruna iOS exploit kit. Former employees disclosed that the kit, comprising roughly two dozen components originally built for a government surveillance client, has been...

By SC Media
Iran War to Escalate US Organizations' Cyber Risk
NewsMar 11, 2026

Iran War to Escalate US Organizations' Cyber Risk

The escalating U.S.–Israel conflict with Iran is expected to heighten cyber threats against U.S. public finance issuers, according to Fitch Ratings. Hacktivist and state‑backed actors may increase DDoS, ransomware, and data‑wiping attacks targeting critical infrastructure. Municipalities, which traditionally lag in...

By SC Media
NZ Businesses Report Surge in AI-Related Security Incidents
NewsMar 11, 2026

NZ Businesses Report Surge in AI-Related Security Incidents

A Kordia survey of nearly 250 New Zealand firms with 50+ employees shows a sharp rise in AI‑related security incidents. Shadow AI now ranks among the top three cyber risks for 24% of respondents, up from 16% a year earlier. Attacks...

By SC Media
Report: APAC Second Most Targeted Region as Attackers Exploit Basic Gaps
NewsMar 11, 2026

Report: APAC Second Most Targeted Region as Attackers Exploit Basic Gaps

The 2026 IBM X‑Force Threat Intelligence Index shows Asia‑Pacific as the world’s second‑most targeted region, responsible for 27% of tracked cyber incidents. Attackers are leveraging basic security gaps, with AI tools speeding vulnerability discovery and automation. Malware accounts for 45%...

By SC Media
Organizations Track Response, Not Prevention, Survey Finds
NewsMar 11, 2026

Organizations Track Response, Not Prevention, Survey Finds

A new Malanta survey of 100 security professionals shows enterprises are still focused on response rather than prevention despite investing heavily in threat intelligence. Companies typically run five to eight feeds—some up to 53—with 71% reporting overlapping data and 100%...

By SC Media
Insider Threats: Malicious and Negligent Incidents on the Rise
NewsMar 9, 2026

Insider Threats: Malicious and Negligent Incidents on the Rise

Recent research highlighted by Tech Radar shows insider threats are climbing sharply. A Mimecast survey of 2,500 IT leaders found 42% of firms reported more malicious insider incidents, matching the same rise in negligent events. Companies now endure an average...

By SC Media
From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222
NewsMar 9, 2026

From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222

In the March 9 2026 CSP #222 episode, Deputy CISO Ian Washburn critiques the flood of generic threat alerts from public‑sector feeds such as CISA, MS‑ISAC and CIS. He argues that funding realignments and revised distribution models could transform raw alerts into timely,...

By SC Media
Codific Highlights Five Key Cyber Risks to Power Grids
NewsMar 4, 2026

Codific Highlights Five Key Cyber Risks to Power Grids

Codific’s new analysis outlines five recurring cyber‑attack pathways that threaten power‑grid operations, from spear‑phishing and credential theft to remote‑access exploitation, ransomware, and the misuse of legitimate industrial commands. The report stresses that most disruptive incidents follow familiar patterns rather than...

By SC Media
UnsolicitedBooker Targets Telecoms in Central Asia with New Backdoors
NewsFeb 25, 2026

UnsolicitedBooker Targets Telecoms in Central Asia with New Backdoors

The China‑aligned threat group UnsolicitedBooker has begun targeting telecommunications providers in Kyrgyzstan and Tajikistan. The campaign employs two custom backdoors, LuciDoor and MarsSnake, delivered through phishing emails that embed malicious Office macros and loaders such as LuciLoad. These implants can...

By SC Media
Georgia Tech Researchers Highlight Vulnerabilities in Threat Intelligence Sharing
NewsFeb 25, 2026

Georgia Tech Researchers Highlight Vulnerabilities in Threat Intelligence Sharing

Georgia Tech researchers have uncovered critical weaknesses in the global threat‑intelligence supply chain, highlighting how inconsistent data quality and limited sharing impede rapid response. Their study, presented at the NDSS Symposium, found that while 67% of vendors sandbox suspicious binaries,...

By SC Media
New UAC-0050 Social Engineering Campaign Discovered
NewsFeb 25, 2026

New UAC-0050 Social Engineering Campaign Discovered

Russia‑linked threat group UAC‑0550, also known as DaVinci Group, launched a sophisticated social‑engineering campaign against a European financial institution that supports Ukraine. The attackers sent legal‑themed phishing emails from a counterfeit Ukrainian judicial domain, directing victims to download a ZIP...

By SC Media
CarGurus Purportedly Breached by ShinyHunters
NewsFeb 19, 2026

CarGurus Purportedly Breached by ShinyHunters

CarGurus disclosed that approximately 1.7 million corporate files were taken by the ShinyHunters hacking group after a voice‑phishing attack compromised its single‑sign‑on credentials on Feb 13. The attackers threatened to publish the data unless negotiations were reached by Feb 20. ShinyHunters has previously...

By SC Media
Remote Access Abuse Drives Majority of Breaches
NewsFeb 19, 2026

Remote Access Abuse Drives Majority of Breaches

Arctic Wolf’s 2026 Threat Report reveals a dramatic shift toward data‑only extortion, which surged from 2% to 22% of incidents in 2025. Remote‑access tool abuse initiated 65% of non‑BEC breaches, while AI‑enhanced phishing powered 85% of BEC attacks. Ransomware remains common,...

By SC Media
Dataminr Report: Cyber Risk Shifted in 2025 with Increased Threat Actor Activity and Mega-Loss Events
NewsFeb 18, 2026

Dataminr Report: Cyber Risk Shifted in 2025 with Increased Threat Actor Activity and Mega-Loss Events

Dataminr’s 2026 Cyber Threat Landscape Report shows a dramatic shift in cyber risk during 2025, with threat‑actor alerts soaring 225% year‑over‑year. Identity‑based intrusions now account for nearly 30% of attacks, driven by an 84% rise in infostealer malware and AI‑enhanced...

By SC Media
How to Transform Your SOC Through XDR and MDR
NewsFeb 17, 2026

How to Transform Your SOC Through XDR and MDR

In a recent Palo Alto Networks webcast, experts highlighted that modern attackers compress breach timelines to under an hour, overwhelming traditional SOC processes. They argued that XDR platforms like Cortex XDR solve the data‑silo problem by unifying telemetry across endpoints,...

By SC Media
CISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog
NewsFeb 14, 2026

CISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, covering SolarWinds Web Help Desk, Microsoft Configuration Manager, Apple operating systems, and Notepad++. The SolarWinds flaw (CVE‑2025‑40536) and the Microsoft SQL‑injection...

By SC Media
Attribution of Sprawling Cyberespionage Campaign Allegedly Held Back Amid China Retaliation Fears
NewsFeb 13, 2026

Attribution of Sprawling Cyberespionage Campaign Allegedly Held Back Amid China Retaliation Fears

Palo Alto Networks' Unit 42 researchers linked the sprawling TGR‑STA‑1030 cyberespionage campaign to an Asian state‑aligned group, but chose not to publicly attribute it to China. Sources say the decision was driven by fears of retaliation, as Palo Alto's security software...

By SC Media
Google Gemini Weaponized in State-Sponsored Attacks
NewsFeb 13, 2026

Google Gemini Weaponized in State-Sponsored Attacks

Google’s Gemini large‑language model is being weaponized by multiple state‑sponsored threat actors, according to the Google Threat Intelligence Group. North Korean UNC2970 and several Chinese groups such as Mustang Panda, Judgment Panda, APT41 and UNC795 are using Gemini for rapid...

By SC Media
From Perimeter to Protocol: Reducing Telecom Attack Surface with Privacy-First Mobile Technology
NewsFeb 13, 2026

From Perimeter to Protocol: Reducing Telecom Attack Surface with Privacy-First Mobile Technology

Telecom operators are confronting nation‑state campaigns such as Salt Typhoon and Volt Typhoon that exploit signaling and subscriber identity systems, rendering traditional perimeter defenses inadequate. In a briefing hosted by the Institute for Critical Infrastructure Technology, experts advocated privacy‑first mobile‑carrier...

By SC Media
Cyberintelligence Institute Launches CYROS App to Warn Against Cyber Threats
NewsFeb 13, 2026

Cyberintelligence Institute Launches CYROS App to Warn Against Cyber Threats

The Cyberintelligence Institute (CII) has released CYROS, a free smartphone app that warns users of emerging cyber threats such as ransomware, phishing, and digital sabotage. The platform aggregates alerts from Germany's Federal Office for Information Security, consumer‑protection groups, and security...

By SC Media