SC Media

@SCMagazine

The official Twitter feed for all things IT security.

NYC
Vrijeme pridruživanja: studeni 2008.

Tweetovi

Blokirali ste korisnika/cu @SCMagazine

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SCMagazine

  1. prije 6 sati

    A new threat intelligence report has underscored the serious threat posed by the Snake , which can disrupt certain industrial controls systems processes.

    Poništi
  2. prije 7 sati

    A critical vulnerability has been found in OpenSMTPD that if exploited could allow an attacker to execute arbitrary code.

    Poništi
  3. prije 8 sati
    Poništi
  4. prije 9 sati

    At least five law firms have been held hostage by the Maze group with these attacks being part of a wider campaign affecting between 45 and 180 total victims

    Poništi
  5. prije 10 sati

    Learn about the latest solutions and trends from industry innovators and thought leaders. Explore the HUMAN ELEMENT of at 2020. View the agenda here:

    Poništi
  6. prije 11 sati

    The Iowa Democratic Party said reporting discrepancies, not a hack, were responsible for delays in reporting results from the .

    Poništi
  7. prije 12 sati

    Cybercriminal group TA505 has reportedly changed up its tactics again, now engaging in campaigns that leverage attachments with HTML redirectors.

    Poništi
  8. prije 12 sati

    Adobe issued patches for six vulnerabilities, three critical, in its Magento Commerce and Open Source products.

    Poništi
  9. prije 13 sati
    Poništi
  10. prije 14 sati
    Poništi
  11. prije 15 sati
    Poništi
  12. 4. velj
    Poništi
  13. 3. velj
    Poništi
  14. 3. velj

    A hacker pleaded guilty to one count of computer fraud and abuse, for stealing and leaking sensitive information related to the Nintendo Switch and various game titles.

    Poništi
  15. 3. velj
    Poništi
  16. 3. velj
    Poništi
  17. 3. velj

    It’s no secret that Fortune 1000 CISOs struggle with compliance, but the pitfalls that fuel the most fury aren’t typically the ones with regulators. No, the battle is often internal.

    Poništi
  18. 3. velj

    Privacy advocates have long called for a federal privacy law and it’s coming. In the mean time, experts say complying with the will lay the groundwork for future compliance with a federal law.

    Poništi
  19. 3. velj

    The current hold ups for passing federal privacy legislation:

    Poništi
  20. 3. velj

    What you need to know regarding cybersecurity legislation on the state level:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·