Posts From CCME

Hackers exploiting the recently disclosed Oracle WebLogic Server remote code execution vulnerability to install a new variant of ransomware called “Sodinokibi.” The vulnerability allows anyone with HTTP access to the server can carry out the attack without authentication. The vulnerability

Cyber Incident Response Tools are more often used by security industries to test the vulnerabilities and provide an emergency incident response to compromised network and applications and helps to take the appropriate mitigation steps. Here you can find the Comprehensive

Newly Emerging DDoS botnet attack that targets one of the most popular bitcoin wallet Electrum and now it reaches the 152,000 infected hosts. This DDoS Botnet rapidly growing and takes many hosts Under its control since April 24 when the

In a proof-of-concept (PoC) blog post published earlier this week, developer James Fisher disclosed a new phishing method in Chrome for mobile on Android in which the browser hides the URL bar. After hiding the URL bar, the browser “passes

Aluminum producer Norsk Hydro estimated the cost of the massive attack cyber attack targeting the company in March at around $50 million. How much cost a security breach? I can tell you that potential damages could be very expensive for

Crooks have stolen $1.75 million in a church BEC (Business Email Compromise) attack, the victim is the Saint Ambrose Catholic Parish. Cybercriminals have stolen $1.75 million in a BEC (Business Email Compromise) attack against the Saint Ambrose Catholic Parish. Saint

The Banking and Financial sectors were hit with a constant stream of cyber attacks when compared to any of the other industries. 25.7 percent of all malware attacks last year focused on Banks and Financial Services Organizations. According to Intsights

Credential stuffing attacks are costing EMEA businesses on average $4m each year, according to new research from Akamai. The content delivery firm commissioned the Ponemon Institute to interview 544 IT security professionals in the region who are familiar with these

Researchers at Malwarebytes are monitoring the evolution of the ElectrumDoSMiner DDoS botnet that reached 152,000 infected hosts. MalwareBytes researchers are closely monitoring attacks against users of the popular Electrum Bitcoin wallet, in particular, the evolution of the Electrum DDoS botnet.

An unknown mystery database exposed nearly 80 million U.S households data that impacting up to 65% of US households. Security Researchers Noam Rotem and Ran Locar uncovered the 24 GB database which is hosted by a Microsoft cloud server. The

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA systems controlling water utilities, transportation systems, electric grids (the power grid) and other critical infrastructure systems. The Industrial Internet of

Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities, the traditional approaches will be increasingly important to maintain, but will simply not be sufficient to properly

Malicious actors could exploit critical security vulnerabilities in a peer-to-peer (P2P) communications technology used across millions of internet of things (IoT) devices, according to research first reported by KrebsonSecurity. Security researcher Paul Marrapese initially reported the vulnerabilities to the device

Financial services organizations are increasingly targeted by attackers using impostor emails attempting to commit fraud, according to the 2019 Email Fraud in Financial Services report published by Proofpoint. The study analyzed more than 160 billion emails sent from 2017 to

When We talking about Quantum Computing, Human Brilliance has now brought the computers a long way, and it’s completely different from what it was when Charles Babbage invented it. With the evolution in technology, businesses are forced to enhance their

Microsoft presented a series of security enhancements for its Windows 10, including the removal of the password-expiration policy. Microsoft announced the removal of the password-expiration policy from its operating system starting with the next Windows 10 feature update (Windows 10