SC Media
@SCMagazine
The official Twitter feed for all things IT security. A CyberRisk Alliance Resource.
In addition to two China-linked threat actors exploiting government agencies via SharePoint zero-days, a third China-backed group deployed Warlock #ransomware on SharePoint servers, @Microsoft reported. #cybersecurity #infosec #ITsecurity bit.ly/3IJ8g6C
President Donald Trump unveiled his AI Action Plan, which focuses on reducing #AI regulations and bolstering innovation while strengthening defenses against AI-related risk. #cybersecurity #infosec #ITsecurity bit.ly/4kW7q3Q
.@Cisco confirmed the attempted exploitation of max severity flaws in its Identity Services Engine (ISE) and ISE Passive Identity Connector. #cybersecurity #infosec #ITsecurity bit.ly/413K9ps
A report from @entrosecurity found that non-human identities (NHIs) continue to outpace human accounts, with the average growing in the past year from 92:1 to 144:1 – a 56% jump in just one year. #IAM #cybersecurity #infosec bit.ly/46wrkit
For #AI to get used responsibly and efficiently by the government, agencies will have to implement stronger and AI-specific data security, governance, and ethical frameworks across the board, says @AvePoint's Dana Simberkoff in this commentary. #infosec bit.ly/4lLHDwp
In addition to two China-linked threat actors exploiting government agencies via SharePoint zero-days, a third China-backed group deployed Warlock #ransomware on SharePoint servers, @Microsoft reported. #cybersecurity #infosec #ITsecurity bit.ly/3IJ8g6C
Recovery is a mark of national maturity — an expression of foresight, design, and strategic clarity, says @InstituteCIT's Cory Simpson in this commentary. For the United States, recovery by design must become the foundation of modernization. #cybersecurity bit.ly/3Ud3h0F
While vulnerability management traditionally has been concerned with patching flaws after they've been found, exposure management is proactive as well as reactive. #cybersecurity #infosec #ITsecurity bit.ly/45323dn
No demographic preferred interacting with an #AI agent instead of a human customer-service agent in a customer identity trends report by @auth0. The ratio against using AI was more than 40-to-1 for Baby Boomers. #IAM #cybersecurity #infosec bit.ly/4m4V9Lc
.@owasp, known for tracking critical web application vulnerabilities, ranks supply chain attacks among the Top 10 risks facing large language model (LLM) applications. #AI #cybersecurity #infosec #ITsecurity bit.ly/3Usxjxa
It’s easy to dismiss hacktivism as a low-level, attention-seeking nuisance, says @radware's Pascal Geenens in this commentary. Please do not underestimate the hacktivists, Geenens says. #cybersecurity #infosec #ITsecurity bit.ly/4kW0ALO
“You can’t fix identity with a product,” said Dr. Dustin Sachs, chief technologist at @cyberleaders. “You fix it by aligning people, policies, and processes — and then choosing the tools to support that framework.” #cybersecurity #IAM #infosec #ITsecurity bit.ly/4mqmPe3
.@AWS' Amazon Q extension for Visual Studio Code reportedly contained a wiper-style prompt injection planted by a hacker. AWS responded to security researchers that “a potentially unapproved code modification was attempted” in the extension. #cybersecurity bit.ly/4o4ByfZ
While news is spreading quicker than ever about unpatched vulnerabilities and zero-day attacks, organizations are not getting any better at installing emergency fixes, according to researchers at the @SANSInstitute. #cybersecurity #infosec #ITsecurity bit.ly/46TCGwQ
Autonomous decision-making and continuous learning are the two leading attributes that present significant opportunities from agentic #AI for lean security teams, says @stellarcyberai's Subo Guha in this commentary. #cybersecurity #infosec #ITsecurity bit.ly/4m3ODEB
Attack path analysis – an important component of a continuous threat exposure management (CTEM) framework – can help security teams, says @XMCyber_'s Yaron Mazor in this commentary, offering five issues security teams should fix. #cybersecurity #IAM bit.ly/45lFaD5
A recent WordPress attack abused Google Tag Manager to redirect visitors to a spam page, @sucurisecurity researchers reported. #cybersecurity #infosec #ITsecurity bit.ly/44KLYKg
The traditional model of network security has been disrupted by several key trends, said @PaloAltoNtwks' Prakash Rajamani in a recent SC Media webcast: the COVID-19 pandemic, widespread remote work, and rapid cloud adoption. #AI #cybersecurity #infosec bit.ly/470eIjE
In addition to two China-linked threat actors exploiting government agencies via SharePoint zero-days, a third China-backed group deployed Warlock #ransomware on SharePoint servers, @Microsoft reported. #cybersecurity #infosec #ITsecurity bit.ly/3IJ8g6C
.@Cisco confirmed the attempted exploitation of max severity flaws in its Identity Services Engine (ISE) and ISE Passive Identity Connector. #cybersecurity #infosec #ITsecurity bit.ly/413K9ps
The U.S. National Nuclear Security Administration, Education Department, Florida’s Department of Revenue, and the Rhode Island General Assembly were among the organizations exploited by various reported SharePoint zero-day bugs. #cybersecurity #infosec bit.ly/44Kletl