Posts From CCME
The ‘from’ address field in an email is supposed to identify the person that sent an email, but unfortunately that’s not always the case. In a Black Hat USA 2020 virtual conference session researchers outlined 18 different attacks against email
EtherOops – A New Attack Let Hackers Exploit a Bug in Ethernet Cables to Bypass Firewall and NATs
Researchers unveiled a very new method that helps to exploit a vulnerability in Ethernet cables to bypass firewalls and NATs. Earlier, this exploitation is considered as non-exploitable; but, now the weakness was named as Etheroops. This vulnerability works only if
More than half (55%) of all cyber-attacks targeted organizations’ applications in 2019, which is a substantial increase compared to the previous few years, when these types of attacks made up around 30% of the total number. This is according to
Nearly half (48%) of organizations regularly push vulnerable code into production in their application security programs due to time pressures, while 31% do so occasionally, according to a new report published by Synopsys entitled Modern Application Development Security. As a
Two California cybersecurity companies have joined forces to help protect healthcare networks from cyber-threats. CynergisTek and Awake Security announced yesterday that they are pooling resources to develop an online threat assessment program that healthcare organizations can use to identify attacker
Online Exam Tool Suffers Data Breach
An investigation is under way into a data breach that impacted an online examination tool used by educational establishments around the world. The breach affected users of software made by American company ProctorU to provide live and automated online proctoring
There has been no shortage of Bluetooth related attacks disclosed in recent years, including BlueBorne and BadBlueTooth among numerous others. At the Black Hat USA 2020 virtual event on August 5, a new attack was added to the list of
In a session at the Black Hat USA 2020 virtual conference on August 5, Kevin Perlow, technical intelligence team lead for one of the largest banks in the US, explained how cyber-attackers are using public standards for financial transactions to
Recently, the U.S. government exposed Chinese surveillance malware “TAIDOOR” that are secretly used by the Chinese government for a decade. There has been a joint notice on TAIDOOR that has been revealed by the cybersecurity department of Homeland security (DHS)
In many cases, the simplest solutions are the best ones as well. However, when it comes to protecting your website from unauthorized access, you may want to go several steps further. Apart from tier-1 precautions like keeping your software up
A cyber-attack on Redcar & Cleveland Borough Council earlier this year has reportedly cost around GBP10m in recovery costs. The attack, which took place in February, caused online public services to be unavailable for 135,000 locals for over a week.
Cybercrime is growing at an “alarming pace” as a result of the ongoing COVID-19 crisis and is expected to accelerate even further, a new report from INTERPOL has found. It revealed the extent to which cyber-criminals are taking advantage of
Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and tools that block ransomware. Initially, WastedLocker appeared this year in May, and it’s a part of the arsenal of the
Protecting A Business From Cyberattacks How To Ensure The Safety Of Your Internet Project?
More than 86% of web applications have critical vulnerabilities that can lead to resource compromise and theft of confidential information. Statistics show that a third of companies apply already on the fact of the first incident. Saving and ignoring information
Researchers Name State with Fewest Data Breaches
North Dakota has suffered fewer data breaches than any other American state over the past 15 years. Analysis of data breaches that have occurred in the United States since 2005 revealed California to be the state hit by the highest
The number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019, according to new research. The rapid increase in this particular type of cyber-scourge was unearthed by threat analysts at Venafi, who gathered data on the misuse