Posts From CCME

The ‘from’ address field in an email is supposed to identify the person that sent an email, but unfortunately that’s not always the case. In a Black Hat USA 2020 virtual conference session researchers outlined 18 different attacks against email

Researchers unveiled a very new method that helps to exploit a vulnerability in Ethernet cables to bypass firewalls and NATs. Earlier, this exploitation is considered as non-exploitable; but, now the weakness was named as Etheroops. This vulnerability works only if

More than half (55%) of all cyber-attacks targeted organizations’ applications in 2019, which is a substantial increase compared to the previous few years, when these types of attacks made up around 30% of the total number. This is according to

Nearly half (48%) of organizations regularly push vulnerable code into production in their application security programs due to time pressures, while 31% do so occasionally, according to a new report published by Synopsys entitled Modern Application Development Security. As a

Two California cybersecurity companies have joined forces to help protect healthcare networks from cyber-threats. CynergisTek and Awake Security announced yesterday that they are pooling resources to develop an online threat assessment program that healthcare organizations can use to identify attacker

An investigation is under way into a data breach that impacted an online examination tool used by educational establishments around the world. The breach affected users of software made by American company ProctorU to provide live and automated online proctoring

There has been no shortage of Bluetooth related attacks disclosed in recent years, including BlueBorne and BadBlueTooth among numerous others. At the Black Hat USA 2020 virtual event on August 5, a new attack was added to the list of

In a session at the Black Hat USA 2020 virtual conference on August 5, Kevin Perlow, technical intelligence team lead for one of the largest banks in the US, explained how cyber-attackers are using public standards for financial transactions to

Recently, the U.S. government exposed Chinese surveillance malware “TAIDOOR” that are secretly used by the Chinese government for a decade. There has been a joint notice on TAIDOOR that has been revealed by the cybersecurity department of Homeland security (DHS)

In many cases, the simplest solutions are the best ones as well. However, when it comes to protecting your website from unauthorized access, you may want to go several steps further. Apart from tier-1 precautions like keeping your software up

A cyber-attack on Redcar & Cleveland Borough Council earlier this year has reportedly cost around GBP10m in recovery costs. The attack, which took place in February, caused online public services to be unavailable for 135,000 locals for over a week.

Cybercrime is growing at an “alarming pace” as a result of the ongoing COVID-19 crisis and is expected to accelerate even further, a new report from INTERPOL has found. It revealed the extent to which cyber-criminals are taking advantage of

Recently one of the most dangerous ransomware, WastedLocker, owes its success to a unique bypass mechanism for security solutions and tools that block ransomware. Initially, WastedLocker appeared this year in May, and it’s a part of the arsenal of the

More than 86% of web applications have critical vulnerabilities that can lead to resource compromise and theft of confidential information. Statistics show that a third of companies apply already on the fact of the first incident. Saving and ignoring information

North Dakota has suffered fewer data breaches than any other American state over the past 15 years. Analysis of data breaches that have occurred in the United States since 2005 revealed California to be the state hit by the highest

The number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019, according to new research. The rapid increase in this particular type of cyber-scourge was unearthed by threat analysts at Venafi, who gathered data on the misuse