Posts From CCME

Sextortion cybercrimes continue to threaten Internet users, scammers are using new tactics to bypass spam filters and secure email gateways. Sextortion scams continue to evolve to bypass security measures such as spam filters and secure email gateways. Sextortion messages threaten

US maritime facilities have been on high alert over the Christmas break after the Coast Guard revealed details of a ransomware-related outage in late December. The bulletin described a recent attack causing widespread operational disruption at a “Maritime Transportation Security

Microsoft has seized scores of domains thought to have been used by a North Korean threat group to support a spear-phishing and information-stealing campaign. The tech giant secured a court order after filing against the “Thallium” group (aka APT37), enabling

The U.S. Army announced bans, soldiers from using the most popular iOS, and Android 15-second video app TikTok. Earlier on Dec. 16, the defense system agency recommended all the employees of the defense department not to use the TikTok app.

Special Olympics of New York, a nonprofit organization focused on competitive athletes with intellectual disabilities was hacked. Special Olympics New York provides inclusive opportunities for people with intellectual disabilities to compete in Olympic-style, coached sports. Unfortunately, the nonprofit organization was

U.S. Coast Guard discloses a ransomware attack on a Maritime Transportation Security Act (MTSA) regulated facility by infamous “Ryuk” Ransomware. “Ryuk” Ransomware involved with so many attacks that targeted various organizations, government networks and cause millions of dollar damages. GBHackers

Microsoft takes control of the 50 domains used by North Korea based Thallium hacker group for breaking into customer accounts and network for stealing sensitive information. The lawsuit was unsealed on December 27 in Virginia federal court, which states that

The United Arab Emirates denied reports that the popular mobile app ToTok was used as part of a government massive surveillance program. According to a report recently published by the New York Times, the popular app ToTok was used by

A security researcher discovered a 3 critical remote code execution vulnerabilities in Ruckus Wireless routers let malicious hackers bypass the routers and take control of it remotely. Ruckus Networks are known as selling wired and wireless networking equipment and software.

Experts uncovered a new tool dubbed BIOLOAD used by the FIN7 cybercrime group used as a dropper for a new variant of the Carbanak backdoor. Security experts from Fortinet’s enSilo have discovered a new loader, dubbed BIOLOAD, associated with the

In September Zynga, the American social game developer running social video game services suffered a data breach that 173 Million accounts. Zynga Inc is an American social game developer running social video game services founded in April 2007, it primarily

Researchers observed a new tool attributed to the FIN7 hacker group dubbed BIOLOAD aimed to minimize the footprint in the victim machine and to avoid detection. The new tool has similarities with FIN7’s BOOSTWRITE tool that abuses the DLL search

Authorities in Thailand are investigating a cyber attack that resulted in the broadcast of surveillance video from inside a prison in the country’s south. Local media reported that hackers broke into the surveillance system at Lang Suan prison in the

A new Distributed Hash Table (DHT) protocol based botnet dubbed Mozi attacks routers with weak passwords and known exploits. The botnet appears to be active at least from September 03, 2019. DHT is a decentralized distributed that provides lookup service

Critical SQLite vulnerabilities named “Magellan 2.0” discovered in World’s most popular browser Google Chrome let hackers exploit the Chromium render process and execute the remote code. SQLite is a well-known database that widely used in popular embedded database software, and

A flaw in the Twitter app for Android could have been exploited by attackers to obtain sensitive information or take over an account. Twitter has recently addressed a security vulnerability that affected the Android version of the app, it could