SC Media
20 articles
OneSpan's Ashish Jain on why passkeys are ready for prime time in modern banking
Ashish Jain explores why passkeys are ready for even the highest risk banking use cases.
F5's Jimmy White on managing runtime risk in enterprise AI systems
Jimmy White discusses why AI security often breaks down at runtime and how organizations can gain visibility and control over AI behavior.
Aamir Lakhani on trends in Fortinet’s 2026 Global Threat Landscape Report
Aamir Lakhani discusses how cyber defenders should respond as AI accelerates attacks.
Resilience's Travis Wong on making cyber risk continuous, quantified, and actionable
Travis Wong explores why measuring risk in dollars changes the conversation at the board level.
Addressing intensified cyber threats requires coordinated action, NCSC head says
UK National Cyber Security Centre CEO Richard Horne urged governments, industry, and allies to mount a sustained, collective "full court press" against incre...
Report: AI ambition outpaces operational reality
Auvik's 2026 IT Trends Report reveals a widening gap between AI ambition and execution, as IT teams grapple with visibility gaps, shadow IT, and staffing sho...
Russia arrests alleged admin of LeakBase cybercrime forum
Russian law enforcement was reported to have apprehended the alleged administrator of the cybercrime forum LeakBase, reports The Hacker News.
Armenian extradited to US over alleged role in RedLine infostealer scheme
Armenian Hambardzum Minasyan has been extradited to the U.S.
US imprisons Russian botnet operator linked to US-targeted ransomware attacks
Security Affairs reports that the U.S.
Cyber risks against US escalate amid DHS shutdown, says CISA official
Cybersecurity risks faced by the U.S.
Cyberattack disrupts Puerto Rico's driver's license issuing agency
Officials at Puerto Rico's Department of Transportation have cancelled all upcoming driver's license, permit, and vehicle registration appointments at the Ce...
Report: Mounting financial fraud threat driven by cloud phones
Infosecurity Magazine reports that threat actors have been increasingly exploiting cloud phones, or virtualized Android devices operating on remote servers, ...
New Context Hub service potentially exploitable in AI supply chain attacks
AI coding agents could be injected with nefarious instructions, resulting in potential supply chain compromise, through a new proof-of-concept attack against...
Microsoft credential phishing weaponizes Bubble AI app builder
Microsoft credential phishing weaponizes Bubble AI app builder AI-powered no-code app-building platform Bubble has been exploited to create illicit web apps ...
Updated GlassWorm attack campaign uncovered
Threat actors have used a multi-stage framework deploying a remote access trojan and a fake information-stealing Google Docs Offline extension for Chrome in ...
Over half of Magento stores subjected to PolyShell intrusions
Intrusions harnessing the PolyShell exploit impacting Adobe Commerce and Magento Open Source instances have already compromised 56.7% of all vulnerable e-com...
RSAC 2026: Get ready for the shift to autonomous IT systems
Autonomous IT systems are now possible, but IT teams still have to prepare for the coming shift.
RSAC SW Live Stream
Legion's Ely Abramovitch on goal-oriented AI investigations
Ely Abramovitch discusses how Legion Investigator bridges automated execution and human-level reasoning.