Robert Abel, SCMagazine

Robert Abel

SCMagazine

New York, NY, United States

Contact Robert

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • SCMagazine

Past articles by Robert:

British Airways hit with record £183 million GDPR fine for last year’s breach

ICO hits British Airways with a record-breaking £183 million fine for last year’s data breach that compromised the personal data of half a million customers. → Read More

Silex bricks 2000 plus IoT devices| SC Media

A new malware dubbed Silex has bricked at least 2000 IoT devices in an ongoing campaign that is expected to intensify in the coming days. → Read More

Dell SupportAssist bug leaves millions of PC’s vulnerable

A vulnerability in Dell’s SupportAssist software, a software designed to protect users from vulnerabilities, has left millions of PC’s vulnerable to remote takeover. → Read More

Threat actors host malware and C2 servers on Microsoft Azure| SC Media

Cyber criminals are storing malicious content, including malware and C2 servers, on Microsoft’s Azure cloud services. → Read More

Undetectable HiddenWasp Linux malware linked to Winnti Umbrella

A sophisticated malware campaign dubbed “HiddenWasp” is targeting Linux systems with the goal of targeted remote control. → Read More

HawkEye malware campaigns upticks on business users

IBM X factor researchers detected an uptick in HawkEye version 9 keylogger infection campaigns targeting business around the world. → Read More

Transient devices require strict control measures as regulatory compliance requirements grow

TThe proliferation of BYOD and portable media devices is increasing the cybercrime attack surface exponentially. TechAdvisory.org reports that 25 percent → Read More

License plate reader firm breached, data leaked

A threat actor by the alias “Boris Bullet-Dodger” broke into the database of a company that provides license plate readers for the U.S. government to use → Read More

Linux variant of Winnti malware spotted in wild

Google’s Chronicle Security team discovered a Linux version of the Winnti malware was used in the 2015 hack of a Vietnamese Gaming company. → Read More

SilverTerrier cybergang evolving new techniques for BEC scams

Palo Alto Networks Unit 42 researchers have actively monitored the evolution of SilverTerrier Nigerian Business Email Compromise (BEC) threat actors. The → Read More

Drupal core patches moderately critical vulnerability

Drupal core released a patch for a moderately critical vulnerability in third party libraries that could allow the by-passing of protection of Phar Steam Wrapper Interceptor. → Read More

Undisclosed number of TurboTax accounts breached

Intuit the company behind tax preparation software TurboTax alerted users their accounts may have been accessed by an unauthorized party. → Read More

Looming retirement of legacy system custodians put global IT systems at risk

Government IT systems and critical infrastructure systems around the world are at risk due to legacy technology and its keepers pending retirements. → Read More

Ethical hacking growing in popularity as data breaches increase| SC Media

The year-end report from Bugcrowd found the top three reasons for bug hunting were for the challenge, professional development, and education. → Read More

ElasticSearch server exposed data of nearly 57M U.S. residents

An ElasticSearch server database containing the information of nearly 57 million U.S. residents was found to have been left exposed without a password. On → Read More

Drone vulnerability could compromise enterprise data

Check Point Researchers developed an attack to hijack DJI drone user accounts which may contain the user’s sensitive information as well as access to the device itself. → Read More

Oracle’s VirtualBox vulnerability leaked by disgruntled researcher

An independent researcher who was disgruntled with traditional bug bounty methods took it upon himself to leak the details of an exploit in Oracle’s → Read More

Sony TVs could allow attackers to hijack your living room

Sony TV’s can be remotely exploited without any authentication by attackers due to three vulnerabilities spotted by Fortinet researchers, with one of the → Read More

Zerodium announced Tor vulnerability on Twitter

The information security firm and exploit vendor Zerodium announced a vulnerability in the Tor browser that could allow an attacker to execute malicious → Read More

Bugcrowd announces free training platform

Bugcrowd crowdsourcing platform last week launched a free educational platform for security researchers called Bugcrowd University. → Read More