Skip to content
Login with Google
SSC Technology & Support
  • Home
  • Help Articles (Coming Soon!)
Menu Close
  • Home
  • Help Articles (Coming Soon!)

PM/GM Requestor

  1. Home>
  2. Submit A Ticket>
  3. PM/GM Requestor
Login with Google
Login with Google
Login to WordPress using LDAP Cloud Identity broker service

Recent Help Articles

  • Allowing Calendar Invites
    March 21, 2024/
    0 Comments

Recent Cybersecurity News

Cybersecurity News

  • The Hacker News
  • Krebs on Security
  • Security lapse lets researchers view React2Shell hackers’ dashboard | CSO Online
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
3 April 2026
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a [...]

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
3 April 2026
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender [...]

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
3 April 2026
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069. [...]

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
3 April 2026
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor [...]

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
3 April 2026
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile [...]

‘CanisterWorm’ Springs Wiper Attack Targeting Iran
23 March 2026
‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data [...]

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
20 March 2026
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things [...]

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
11 March 2026
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of [...]

Microsoft Patch Tuesday, March 2026 Edition
11 March 2026
Microsoft Patch Tuesday, March 2026 Edition

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to [...]

How AI Assistants are Moving the Security Goalposts
8 March 2026
How AI Assistants are Moving the Security Goalposts

AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers [...]

Security lapse lets researchers view React2Shell hackers’ dashboard
3 April 2026
Security lapse lets researchers view React2Shell hackers’ dashboard

An apparent security lapse has allowed researchers to peer into the work of a threat group currently exploiting unpatched servers open to the four-month-old React2Shell vulnerability to steal login credentials, [...]

A core infrastructure engineer pleads guilty to federal charges in insider attack
3 April 2026
A core infrastructure engineer pleads guilty to federal charges in insider attack

When Daniel Rhyne pleaded guilty on April 1 to having launched an insider extortion attack against his then-employer, authorities enumerated the techniques he used, including unauthorized remote desktop sessions, deletion [...]

Google patches fourth Chrome zero-day so far this year
3 April 2026
Google patches fourth Chrome zero-day so far this year

Google has patched another zero-day vulnerability in Chrome, its fourth this year. In patching the vulnerability, tracked as CVE-2026-5281, the company acknowledged that an exploit for it already exists in [...]

Internet Bug Bounty program hits pause on payouts
3 April 2026
Internet Bug Bounty program hits pause on payouts

Researchers who identify and report bugs in open-source software will no longer be rewarded by the Internet Bug Bounty team. HackerOne, which administers the program, has said that it is [...]

Claude Code is still vulnerable to an attack Anthropic has already fixed
3 April 2026
Claude Code is still vulnerable to an attack Anthropic has already fixed

The leak of Claude Code’s source is already having consequences for the tool’s security. Researchers have spotted a vulnerability documented in the code. The vulnerability, revealed by AI security company [...]

2026 Sureswift Worldwide Inc Technology & Support Portal