SC Media
20 articles
Intensified robocall clampdown mulled by FCC
The Federal Communications Commission has unveiled a proposed rule pushing for more stringent anti-robocall measures on top of already available know your cu...
US Treasury to offer free cybersecurity intelligence to crypto firms
The U.S.
All Brazilians potentially impacted by alleged breach of Experian subsidiary
Cybernews reports that Serasa Experian, the Brazilian subsidiary of credit risk and fraud prevention firm Experian, had 1.8 TB of data belonging to 223 milli...
EngageLab SDK bug threatened expansive Android crypto wallet compromise
Popular third-party Android software development kit EngageLab SDK has been impacted by an already addressed intent redirection flaw, which could have been e...
High-value crypto asset theft sought by novel notnullOSX macOS malware
Attacks with the nascent notnullOSX malware for macOS have been targeting cryptocurrency wallets containing over $10,000 in Taiwan, Vietnam, and Spain as par...
Advanced STX RAT sets sights on financial services industry
Advanced STX RAT sets sights on financial services industry Infosecurity Magazine reports that highly sophisticated tactics have been employed to covertly de...
Hacker faux pas uncloaks North Korean IT worker scheme
North Korea had one of its IT worker scams' secrets unravel after a hacker inadvertently executed information-stealing malware on their own computer, accordi...
Report: US accounts for most PLCs subjected to Iranian targeting
Almost 3,900, or nearly 75%, of 5,219 internet-exposed Rockwell Automation/Allen-Bradley programmable logic controllers used in critical infrastructure entit...
Chrome 146 introduces device bound session credentials to combat info-stealing malware
DBSC works by cryptographically linking a user's session to their hardware, utilizing the Trusted Platform Module (TPM) on Windows.
Apiiro launches CLI to integrate application security into AI development workflows
Apiiro argues that current security workflows are reactive, relying on scanning and remediation after code is written, a model unsustainable with AI's speed.
Global crypto scam disrupted, $12 million recovered in Operation Atlantic
The week-long initiative, named Operation Atlantic, was a joint effort involving the US Secret Service, the UK National Crime Agency, and Canadian police for...
Blind spots at scale: The hidden risks of identity visibility gaps and shadow AI
Why legacy IAM systems can't properly detect or manage NHIs and shadow AI.
Bessent, Powell met privately with top bankers over impact of Claude Mythos on cybersecurity
Security pros say companies that spend less money than most large banks on cyber should take this as a warning to get moving.
Zephyr Energy loses £700,000 in payment fraud attack
The incident, disclosed in a regulatory filing, involved a business email compromise attack where cybercriminals likely infiltrated email or accounting syste...
China supercomputer breach: 10 petabytes of military data allegedly stolen by 'FlamingChina'
The stolen data, reportedly offered for sale, is said to contain simulations and schematics of aircraft, missiles, and bombs, originating from top organizati...
New Lua malware LucidRook targets Taiwanese NGOs
The attacks, discovered in October 2025, utilize RAR or 7-Zip archives with lures to deliver a dropper called LucidPawn.
Cryptographers bet on quantum computing's impact on encryption
This bet stems from the ongoing debate about when quantum computers will become powerful enough to decrypt data secured by legacy algorithms, a threat that t...
Adobe Reader zero-day exploit used in months-long cyber campaign
Cybersecurity researcher Haifei Li discovered a malicious PDF that prompted a call for community analysis due to its unpatched and actively abused nature.
Bitcoin Depot loses $3.6 million in Bitcoin after system breach
The breach allowed unauthorized access to Bitcoin Depot's corporate IT systems, leading to the theft of 50.903 Bitcoin, valued at roughly $3.