
Shaun Nichols
Writer at Freelance
Senior Content Editor at CyberRisk Alliance
Writer with @scmagazine formerly @SearchSecurity @LBNLcs, @theregister and some departed publications. He/him. After-hours (possibly NSFW): @ShaunIsntFunny
Articles
-
5 days ago |
scworld.com | Shaun Nichols
A known Russian cybercrime outfit has armed itself with a new malware suite that allows for the theft of user accounts and credentials, posing a substantial threat to organizations in the West. The group known as "ColdRiver" has been spotted in the wild using a previously unknown piece of data-stealing malware designated as “LostKeys.” According to the Google Threat Intelligence Group (GTIG) the malware is able to covertly swipe credentials for specific services from target machines.
-
5 days ago |
scworld.com | Shaun Nichols
Threat actors are looking to prey on antiquated routers meeting the end of life their life and patch support cycle, according to an alert from the Federal Bureau of Investigations (FBI), which said it has seen a surge in attacks against antiquated network gear that no longer receives regular security updates. The FBI alert said renewed activity against vulnerable routers were observed that have not been updated in some time.
-
6 days ago |
scworld.com | Shaun Nichols
North Korean threat actors are leaving some telltale signs that could allow network defenders to spot and block malicious activity. Researchers with security firm ReliaQuest found that, in many cases, groups working out of the Hermit Kingdom tend to give away their intentions with a series of common blunders and activity patterns.
-
1 week ago |
scworld.com | Shaun Nichols
An international cybercrime operation was traced back to an unlikely source: a warlord controlling a remote part of Myanmar. The U.S. Department of Treasury said it believed Saw Chit Thu and his sons Saw Htoo Eh Moo and Saw Chit Chi were using their control over the Karen region of Myanmar bordering Thailand to operate a hub for fraud and cybercrime activities.
-
1 week ago |
scworld.com | Shaun Nichols
Threat actors are targeting organizations by disguising their malware payloads as resume submissions to human resources (HR) departments. The team at Arctic Wolf reported that a privately-run malware operation known as Venom Spider has been targeting HR professionals by way of phony resume submissions and fake personal websites pretending to be job seekers.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 17K
- DMs Open
- Yes

Deliberately giving your readers false information in an effort to prove a nonexistent point to other journalists is some wild shit

Ahem... https://t.co/TLlEM7hJGS

Dear reporters: CLEAN UP AFTER YOURSELF in the press room https://t.co/RFcU6nJz4q