Posts From CCME

Iran-linked APT34 group has targeted a U.S.-based research company that provides services to businesses and government organizations. Security experts from Intezer observed targeted attacks on a US-based research company that provides services to businesses and government organizations. “Our researchers Paul Litvak

Critical remote code execution and spoofing vulnerabilities that existed in the Microsoft Azure cloud infrastructure allow attackers to remotely exploiting the vulnerability and compromise the Azure cloud servers. Researchers from checkpoint found an Azure Stack Spoofing vulnerability in Azure Stack

Cisco published a security advisory that fixes multiple vulnerabilities with Cisco Small Business Switches. The vulnerabilities allow an unauthenticated remote attacker to access sensitive information with the devices and cause DoS conditions. CVE-2019-15993 – Information Disclosure Vulnerability The vulnerability is

Check Point detailed two recently patched vulnerabilities in Microsoft Azure services that could have allowed hackers to take over cloud services. Check Point researchers have published technical details of two recently fixed flaws in Microsoft Azure that could have allowed hackers to take over

An employee at a New York City medical center was tricked into giving out patient information by a threat actor purporting to be one of the facility’s executives. The data was shared by an individual at community-based non-profit the VillageCare

Cybersecurity firm Expel Inc. has announced a $1.4m investment to expand its operations in Fairfax County, Virginia. The huge injection of cash will be used to increase the size of the company’s Herndon headquarters and to create 164 new jobs

New research released yesterday by the Ponemon Institute reveals a dramatic increase in both the frequency of insider threats and their financial cost to businesses since 2018. The report, “2020 Cost of Insider Threats: Global,” shows that the average global

Hackers compromised dozens of United Nations (UN) servers last summer in an attack which the world body kept a secret from its own employees, according to a new report. The attack began in mid-July 2019 in what one senior UN

The future of security and privacy should be focused on the person and the impact upon them. Speaking to Infosecurity at the DigiCert Security Summit in San Diego, DigiCert CEO John Merrill said that security is about privacy and trust,

A leaked confidential report from the United Nations revealed that dozens of servers belonging to United Nations were “compromised” at offices in Geneva and Vienna. An internal confidential report from the United Nations that was leaked to The New Humanitarian

A hacker has taken to Twitter to share design secrets they allegedly obtained by compromising American automotive and energy company Tesla. Posting on the account @greentheonly on Friday night, a hacker who calls themself “Green” said that Tesla was planning

New revelations on the Wawa card data breach suggests that the incident might have exposed 30 million customers’ data that are now available online for sale. In December 2019, Wawa convenience store chain disclosed a payment card breach, its security team

Researchers investigate a new perceptual challenge that causes the ADAS systems and autopilots of semi/fully autonomous to consider depthless objects (phantoms) as real.  Abstract The absence of deployed vehicular communication systems, which prevents the advanced driving assistance systems (ADASs) and

A South Carolina water company is recovering from a cyber-attack that took its phone and online payment systems offline for nearly a week. The cyber-attack on Greenville Water triggered a payment system outage that began on Wednesday, January 22. Company

A panel of experts from Japan’s Ministry of Internal Affairs and Communications proposed a set of emergency cybersecurity measures on Monday ahead of this year’s Olympic and Paralympic Games. The measures were shared amid fears that Japan will experience a

Security researchers are warning that the technology underpinning many smart city deployments is susceptible to a range of cyber-attacks, enabling hackers to sabotage infrastructure in potentially life-threatening raids. IOActive’s latest research paper covers LoRaWAN, or the Long-Range Wide Area Network