Posts From CCME

Cybercriminals using Email spoofing methods to deliver forged emails to recipients. the email servers that are available publically available can be used for Email spoofing attack. With GBHackers Email spoofing Tool you can test that your server configured with an

Security researchers have warned of a new wave of attacks on Middle Eastern companies from APT33, a group with links to Iran. Known as “Elfin” and “Refined Kitten,” the group has been in operation since 2015, using a combination of

A result of cyberwar between Microsoft and the APT 35 hackers group, now Microsoft authorized to seize 99 illegal domains that operated by the APT 35 For various illegal hacking operations. Microsoft won the court case that filled in the

Security researchers have found a new government spyware, tracked as Exodus, that was distributed through the Google Play Store. A research conducted by members and associates of Security Without Borders organization along with Motherboard has revealed that government spyware that

More than 500 million Android users have been put at risk of a man in the middle (MITM) attack resulting from a popular web browser’s ability to secretly download auxiliary components from the internet, according to blog posts from both

Privacy in the digital world is not possible, according to a new report from Kaspersky Lab that looked at consumers’ attitudes about the security of their personal information online. The new report surveyed 11,887 consumers in 21 countries and found

Debian released security updates that fix multiple vulnerabilities with Thunderbird mail client, twig and dovecot Packages that leads to DOS, information disclosure and Arbitrary Code Execution. DSA-4420 thunderbird The security update covers multiple vulnerabilities with Thunderbird mail client that allows

Experts at Skylight Cyber released the list of 600 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS customers. Skylight Cyber released the list of 583 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS customers.

A new wave of Emotet malware campaign distribute the Nozelesn ransomware that targets hospitality industries based endpoint systems via malicious word documents. Telemetry had over 14,000 detections via emotet spam emails that are distributed all over the world between January

FireEye released Commando VM, a Windows-based security distribution designed for penetration testers that intend to use the Microsoft OS. FireEye released Commando VM, the Windows-based security distribution designed for penetration testing and red teaming. FireEye today released an automated installer

Osmedeus is a fully automated tool that allows you to run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. How to use If you have no idea what are you doing just type the command

Single Sign-on is a method of authentication process that helps to log in multiple application using single login credentials. Security is enhanced through Single Sign-on (SSO) in light of the fact that users are diminished of the various secret password

Cyber Criminals launching a new malware via weaponized PDF & MS Word Version of New Zealand terror suspect’s manifesto. Researchers noticed 8chan, an imageboard website composed of user-created boards contains several posts that link to a manifesto, allegedly authored by

Bithumb Hacked 3rd time, Yes, One of the worlds largest cryptocurrency exchange Bithumb Hacked by unknown cybercriminals and stolen nearly $20 million worth cryptocurrencies from its wallet. Bithumb is a South Korean cryptocurrency exchange allegedly facing continuous cyber attacks since

Toyota hacked, yes, Toyota major subsidiaries network compromised by unknown hackers and they gained unauthorized access to the network where Toyota stored nearly 3.1 million customers sensitive information. Toyota Motor Corporation is a Japan-based, world’s second-largest automotive manufacturer who produces

You may be a victim for ShadowHammer hack, here is the complete list of the MAC Address, tool to check for infection and the update to resolve the issues. Operation ShadowHammer targeted the ASUS computers software update tool to inject