Posts From CCME

Cybercriminals compromise the New Bedford, Massachusetts city computers with the Ryuk Ransomware and demanding $5.3 million to unlock the compromised computers. July 5, 2019, City of New Bedford’s Management Information Systems (MIS) identified the ransomware that infected several computers. Soon

Researchers disclosed an unpatched Android zero-day vulnerability that allows local attackers to escalate the privilege and take control of the device. A high severity privilege vulnerability resides within the v4l2 driver which allows an attacker to leverage the lack of

419 Million Facebook user accounts exposed online from an unsecured server that includes a unique Facebook ID and the phone number listed with the account. The details are exposed from the server that doesn’t have any password protection, the database

A Massachusetts city has revealed that cyber-criminals tried to hold its data ransom to the tune of more than $5m over the summer, in a sign of the growing risk to organizations from online extortionists. The city of New Bedford

Google and YouTube have agreed to pay $170m to settle a case brought by the FTC and New York Attorney General alleging they illegally harvested personal data on children. The Children’s Online Privacy Protection Act (COPPA) requires online firms to

Researchers discovered an advanced SMS phishing attack on some of the targeted Android phone’s that allows a remote attacker to trick victims in accepting the new settings and control the browser home page, Email server over the air. There are

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the Attack Chain. Let’s move on to the phases of SOC and advanced level of protecting the

An incident response plan is very essential for any organization to respond to the incident as quickly as possible. Here we have overviewed about how to respond to the cyber incident and the necessary action that needs to be taken.

New problems to Facebook, phone numbers associated with more than 400 million accounts of the social network giant were exposed online. A new privacy incident involved Facebook, according to TechCruch, phone numbers associated with 419 million accounts of the social

Research has revealed that 40% of IT security professionals think paying to retrieve data targeted by ransomware should be made illegal. The findings come from a survey of 145 security pros who visited AT&T’s booth at this year’s Black Hat

Research into insider threats has found that employees are so reticent to snitch on bosses they suspect are threat actors that senior staff are virtually immune from being reported. Researchers at Red Goat Cyber Security questioned 1,145 participants across a

Security flaws have been discovered in 600,000 GPS tracking devices intended to keep society’s most vulnerable members safe. Researchers at Avast Threat Labs found a number of vulnerabilities in 29 different device models commonly used to track the whereabouts of

Twitter opted to temporarily disable the feature that allows users to post tweets via SMS, in response to the hack of the CEO’s account. Twitter announced to temporarily disable the feature that allows users to post tweets via SMS, in

A global cyber-skills training provider has become the first company to integrate its platform with the MITRE ATT&CK framework. Immersive Labs has mapped its training to the globally recognized knowledge base, which organizes and categorizes various types of tactics, techniques,

Experts warn of advanced phishing attacks in certain modern Android-based phones that can trick users into accepting new malicious phone settings. When users insert a new SIM in their mobile phone and access to the cellular network for the first

A bill intended to strengthen and modernize the cybersecurity of federal agencies will be introduced to the United States House of Representatives this week. The Advancing Cybersecurity Diagnostics and Mitigation Act would formally codify the dynamic Continuous Diagnostics and Mitigation