Posts From CCME

Ensure management adoption and employee engagement in your security awareness program by delivering suitable content in an understandable language. Speaking at the Gartner Security and Risk Virtual Summit, senior director Brian Reed said that getting investment and support for a

Creating trust on the internet requires the aligning of effective online fraud protection with good customer experience, according to Jonathan Care, senior director analyst at Gartner. Speaking during the Gartner Security and Risk Virtual Summit, he observed that currently, many

UK business owners have been targeted by a new phishing scam that attempts to gain sensitive information, including payment details, by impersonating Her Majesty’s Revenue and Customs (HMRC), according to an investigation by accountancy firm Lanop Outsourcing. In emails purporting

Security and risk leaders need to know where their plans for digital transformation are going. Speaking in the closing keynote of the Gartner Security and Risk Virtual Summit, distinguished VP analyst Mary Mesaglio said leaders are facing four current crises

IT firm Pure Storage has entered into a definitive agreement to acquire Portworx, a Kubernetes data services platform. The deal, which is believed to be worth around $370m, is part of Pure Storage’s plan to expand into the market for

Apple release updates for iOS and iPadOS operating systems that fixes several security iPhone, iPad, and iPod devices. With the security update, Apple addressed 11 bugs in various products and components such as AppleAVD, Apple Keyboard, WebKit, and Siri. Among

The Maze ransomware operators now use a virtual machine to encrypt a computer, a tactic previously adopted by the Ragnar Locker malware. The Maze ransomware operators have adopted a new tactic to evade detection, their malware now encrypts a computer

A woman in need of urgent medical treatment has died after a hospital under cyber-attack was unable to admit her. Attackers struck the Dusseldorf University Clinic (DUC) last Thursday, causing IT systems at the major hospital to fail. Because of

Google has told app developers to remove from its Play Store stalkerware capable of operating behind the scenes without the user’s consent. The tech giant yesterday issued an update to its Developer Program Policy requiring all apps that track users

Security information and event management (SIEM) company Securonix has announced two new C-suite appointments to bolster its growth. Brett Bowman joins Securonix as chief financial officer and Dilshan Ratnayake as chief people officer. Bowman brings previous experience in defining and

Academia has faced fresh warnings of cyber-attacks after a rise was recorded in August when students returned. According to an alert issued by the National Cyber Security Centre (NCSC) there has been a recent spike in ransomware attacks against UK

There has been a 151% increase in the number of DDoS attacks in the first half of 2020, compared to the same period in 2019. According to Neustar’s latest CyberThreats and Trends Report, these attacks include the largest that Neustar

A ransomware attack need not be tragic for midsized enterprises. That is according to Paul Furtado, senior director, midsized enterprise security at Gartner, speaking at the Gartner Security and Risk Virtual Summit. He said a midsized enterprise is defined as

Former Australian Prime Minister Tony Abbott’s passport details and personal phone number were obtained by a hacker, it has been reported. Writing on his personal blog, Australian hacker Alex Hope outlined that he was able to gain this sensitive information

Security researchers from Proofpoint discovered critical security vulnerabilities with multi-factor authentication (MFA) implementations in the cloud environment where the WS-Trust is enabled. WS-Trust is a specification and OASIS standard designed to manage with the issuing, renewing, and validating of security

The source code of the infamous Cerberus banking Trojan has been released for free on underground hacking forums following a failed auction.  The author of the Cerberus banking Trojan has released the source code of the malware on underground hacking