Posts From CCME

The recent SolarWinds hack has left several companies and government agencies reeling in their wake having caused widespread chaos and panic. Following up from this, the Cybersecurity and Infrastructure Security Agency (CISA) has updated its official guidance for dealing with the impacts

American cybersecurity company White Ops announced today that it has been acquired by Goldman Sachs’ Merchant Banking Division in partnership with ClearSky Security and NightDragon. Terms of the transaction, which follows Goldman Sachs’ and ClearSky’s initial investment in White Ops earlier this year, were not disclosed. The business was

Microsoft security researchers have continued to investigate Solorigate which caused supply chain compromise and the subsequent compromise of cloud assets and have said that the ultimate ambition of the compromise was to pivot to the victims’ cloud assets after deploying

It’s safe to assume that pretty much everyone is ready to move on from 2020. Between the COVID-19 pandemic, political battles, and social unrest, this has been a stressful year in so many ways. It has also been a very active year for cybercriminals

Google delivered over 33,000 alerts to its users during the first three quarters of 2020 to warn them of attacks from nation-state actors. Google delivered 33,015 alerts to its users during the first three quarters of 2020 to warn them

Threat researchers have spotted a new kind of cyber-attack that uses a variant of Mirai malware to target a port used by IoT devices. The attack, orchestrated by someone using the alias “Priority,” was detected by a team at Juniper

Internal culture is a major determinant in how effective organizations’ cybersecurity practices and behaviors, according to a panel discussion at this week’s Digital Transformation Expo. They began by looking at how organizations can maintain a strong cybersecurity culture even while

GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool was announced initially in May at the GitHub Satellite conference, since that time it is available for GitHub beta testers.

Researchers at an Israeli operational technology (OT) company have discovered multiple critical vulnerabilities in two popular industrial remote access software solutions. The flaws can be exploited to access industrial production floors, break into company networks, tamper with data, or steal

The Cyber Readiness Institute (CRI) has expanded its partnership with the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to improve the cybersecurity of remote workers. CISA and the CRI have together launched a new cybersecurity toolkit

Kylie Jenner’s makeup company has warned customers that their information may have been compromised in a recently detected security incident at a Canadian e-commerce merchant. Earlier this month, Shopify reported the theft, by members of its own support team, of

Around one in three (31%) people in the UK are not actively concerned about cybersecurity, according to a study by ESET. In a survey of 2000 UK citizens, which looked at their cybersecurity habits, more than half (57%) do not

Buy online, pick-up in store fraud rose by 55% in the first half of 2020, according to the latest edition of the Forter Fraud Attack Index, published today. The study demonstrates that e-commerce is increasingly being targeted by fraudsters following

Ransomware gangs are performing wide-ranging internet scans to find vulnerable systems and then accelerating attacks to just minutes to capitalize on COVID-19, Microsoft has warned. Corporate VP of customer security and trust, Tom Burt, revealed the findings in a blog

Joker is one of the most prominent malware families that continuously target the Android devices, it’s main activity is to stimulate clicks on SMS message and subscribe for unwanted paid premium services. The malware found again in Google play by

Scammers sell and buy personal information on the dark web, a network of websites that uses special software. This hides a user’s details, like their location, and encryptsall browsing activity. Services like Check People search the dark web and inform