Posts From CCME

Security experts at Kaspersky Lab over 60,000 stolen profiles are offered for sale on an invitation-based private marketplace called Genesis Store. More than 60,000 stolen profiles are offered for sale in the underground marketplace Genesis Store, it includes browser fingerprints,

Security researchers discovered a new vulnerability in WPA3 Protocol named as “Dragonblood” allows hackers to steal the WiFi Password from WP3 enabled WiFi Network. This serious vulnerability in WPA3 protocol let cyber criminals crack the password and access the encrypted

Minnesota Department of Human Services announced to have suffered a data breach that may have exposed the personal information of about 11,000 people. Minnesota Department of Human Services suffered a data breach that may have exposed the personal information of

Those who have embarked on the process of convergence shared their experiences and challenges at ISC West 2019 in Las Vegas, during an SIA Education panel, Next Generation Security: The Truths, the Myths, the Future of Fusion Centers and Security

As the physical and cyber worlds continue to converge, those who have historically only focused on physical security are now challenged with the risks posed from connected internet of things (IoT) devices, a topic of interest at this year’s ISC

Palo Alto Networks researchers discovered a new variant of the Mirai malware that is targeting more processor architectures than previous ones. Mirai botnet continues to be one of the most dangerous malware in the threat landscape, experts at Palo Alto

Bahrain, 08.04.2019 – Group-IB, an international company that specializes in preventing cyberattacks, and NGN International, a global system integrator, analyzed cybersecurity landscape in Gulf countries in 2018. Group-IB Threat Intelligence team identified compromised credentials of 7 306 users from the

Researchers suspect that a new stealer malware dubbed Baldr, first detected in January, has incorporated three known threat actors, according to Malwarebytes. In today’s blog post, researchers said that Baldr has earned positive reviews on Russian hacking forums for its

WPScan is a WordPress security scan for detecting and reporting WordPress vulnerabilities. WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one of the powerful and most used blogging tools. As there

A Japanese manufacturer has seen output plummet for several days after being hit by the first stage in an attempted crypto-mining cyber-attack, according to reports. Optical equipment maker Hoya, which operates in over 30 countries worldwide, is said to have

Cyber-criminals have been trading stolen identities in Genesis, an underground marketplace, and then using them to bypass anti-fraud protections, according to Kaspersky Lab. At the 2019 Security Analyst Summit (SAS), researchers announced the findings of their Genesis investigation. According to

Security researchers at Tenable uncovered multiple flaws with Verizon Fios Quantum Gateway router that allows a remote attacker to gain complete access over the network. By exploiting the vulnerability an attacker could sniff into victims network traffic and van exfiltrate

Adobe security updates released for April with the fixes of 43 vulnerabilities that affected different Adobe products. There are 8 different Adobe products are affected including Adobe Flash Player, Shockwave Player, Dreamweaver, Adobe XD CC, Adobe Experience Manager Forms, and

FileTSAR, a free open source tool that combines various open source forensic investigation tools used by law enforcement agencies. The all-in-one cybersecurity toolkit was developed by Purdue Polytechnic researchers to help detectives in the reconstruction of digital evidence from multiple

Kaspersky Lab reported that hundreds of users have been targeted with malware over the past month as part of a recent Roaming Mantis campaign. Security experts at Kaspersky Lab reported that hundreds of users have been targeted with malware over

Some 90% of critical infrastructure (CNI) providers claim that their IT/OT environment has been damaged by a cyber-attack over the past two years, according to a new Ponemon Institute report. Sponsored by security vendor Tenable, the Cybersecurity in Operational Technology: