Posts From CCME

Speaking at the Cloud Security Alliance (CSA) summit at the RSA Conference in San Francisco, Alex Stamos, adjunct professor at Stanford University’s Freeman-Spogli Institute, said that issues and decisions made by technology companies have angered people. Stamos, who previously served

The University of Washington School of Medicine is facing a class-action lawsuit over a data breach that impacted 974,000 patients. Plaintiffs claim UW Medicine failed to “properly secure and safeguard” patients’ personal health information (PHI), resulting in the exposure of

When you interview for the profile of a cybersecurity professional the interviewer will get into the technical bits to establish your level of expertise once they finish asking you about your professional experience, educational details, and more such obligatory questions.

The infamous Joker malware has found a way to bypass the security checks to be published in the official Play Store, new clicker was found by experts. The fight to the Joker malware (aka Bread) begun in September 2019 when

A new clicker malware found in Google play dubbed Haken aims to gain control over the affected devices and to generate illegitimate profit. Checkpoint researchers observed the new malware family while looking for another clicker malware BearClod. The Haken malware

Consulting firm Booz Allen Hamilton has been awarded a new $113m contract to deliver modernized cyber-defense operations to the United States Securities and Exchange Commission (SEC). With this new 10-year contract, the Virginia-based firm will become the SEC’s leading provider

A proposed class-action lawsuit has been filed against New Jersey’s largest hospital health network over a ransomware attack that happened in December. Threat actors infected the computer systems of Hackensack Meridian Health, causing a system-wide shutdown on December 2. The

Researchers discovered multiple unsigned firmware in various system components such as WiFi adapters, USB hubs, trackpads, and cameras used in Lenovo, Dell, HP and other major manufacturers. The flaws existing in these components allowed the attackers to compromise millions of

The UK government has again named and shamed Russian military intelligence for attempting to destabilize a foreign nation via cyber-attacks, this time a wide-ranging operation on targets in Georgia last October. The attacks led to the defacement of over 15,000

Stolen data from millions of MGM Resorts guests widely reported to have been posted to the dark web this week has actually been circulating on hacking forums for over six months, according to experts. Irina Nesterovsky, head of research at

More than 400 flaws affecting industrial control systems (ICS) were disclosed in 2019, more than 100 were zero-day vulnerabilities. According to a report published by Dragos, the experts analyzed 438 ICS vulnerabilities that were reported in 212 security advisories, 26%

Lokibot trojan malware emerges first in the year 2015, it is known for stealing sensitive details such as usernames, passwords, bank details, and cryptocurrency wallets. The threat actors behind the malware continue to add various capabilities over the years and

Based on a series of Twitter polls hosted by Sumo Logic, 40.3% of Twitter users that responded said that SIEM is valued most as a “security control” whilst less than a quarter saw it used for threat detection or data

Britain and the United governments blame Russia for being behind a destructive cyber attack that hit Georgia during 2019. The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that

HP Inc. has announced that it has joined the Buyers Lab (BLI) Security Validation Testing program for MFPs and printers to help drive more stringent industry standards for printer security. Common endpoint devices such as office printers have proven to

Cisco has released security updates to address 17 vulnerabilities affecting its networking and unified communications product lines. Cisco has released security patches to fix 17 vulnerabilities affecting its networking and unified communications product lines. The types of fixedvulnerabilities include remote access and