Posts From CCME

Microsoft has warned of a new type of data stealing Java-based ransomware, dubbed PonyFinal. PonyFinal is what Microsoft describes as “human-operated ransomware” — to distinguish it from commoditized variants that are distributed in an automated way by hackers. The tech

Threat actors targeted industrial suppliers in Japan and several European countries in sophisticated attacks, Kaspersky reported. Researchers from Kaspersky’s ICS CERT unit reported that threat actors targeted industrial suppliers in Japan and several European countries in sophisticated attacks. The experts

For newbies setting up a brand new site, we all struggle with keeping our sites secure. Since we’re so new to the website game, it’s hard to know what the right measures are to keep our shiny new websites safe

Hewlett Packard Enterprise (HPE) has announced the inclusion of RackTop Systems’ BrickStor SP in its Complete program. BrickStor SP is a data security software platform that boldly claims to eliminate the threat of ransomware attacks and data breaches. The platform

An internet intelligence gateway has been established to analyze and compile malicious URLs related to COVID-19. With thousands of newly created COVID-19-related malicious websites launching every day, the gateway accepts submissions of suspicious URLs or emails, providing a lookup service

IT leaders who trust their employees to follow security best practices while working from home are sadly overoptimistic. According to new research published today by email security firm Tessian, while 91% of IT leaders believe their staff are doing their

C-suite executives are the people most susceptible to mobile-based cyber-attacks in businesses, according to a study from MobileIron. The report, entitled Trouble at the Top found that while these executives are highly targeted by cyber-criminals in attacks on organizations, they

Remote workers have been targeted by up to 65,000 Google-branded cyber-attacks during the first four months of 2020, according to a new report by Barracuda Networks. The study found that Google file sharing and storage websites were used in 65%

Google Threat Analysis Group (TAG) has published today its first TAG quarterly report that analyzes rising trends in nation-state and financially motivated attacks. Google also discloses seven coordinated political influence campaigns that took place on its platforms during Q1 2020.

Asigra Inc., a leader in backup and recovery software that delivers comprehensive repository cyber protection, today highlighted a number of best practices proposed by providers of both preventative and responsive solutions for combating the financial ramifications of ransomware. “Ransomware attacks

Valak malware has rapidly changed over the past six months, it was initially designed as a loader, but now it implemented infostealer capabilities. The Valak malware completely changed over the past six months, it was first developed to act as

Security researchers are claiming victory after unmasking an infamous hacktivist who defaced nearly 5000 websites in more than 40 countries over the past few years. The individual, known online as “VandaTheGod” on Twitter, took to social media to publicize his

A web application firewall is a firewall that monitors, filters and blocks statistics packets as they journey to and from an internet site or net software. AWAF can be either network-based, host-based totally or cloud-based totally and is frequently deployed

Ransomware operators had another standout year in 2019, with attacks and ransom demands soaring according to new data from Group-IB. The Singapore-based security vendor claimed that, after a relatively quiet 2018, ransomware was back with a vengeance last year, as

The denial of service attacks (DDoS) causes a system or service to be inaccessible to a legitimate user. We have seen a diverse range of DDoS attacks that have affected many users around the world used by the cybercriminals and

The supply of dark web drugs soared nearly 500% over the first few months of this year as dealers took to the internet to continue trading, according to new data from Sixgill. The cyber-intelligence company monitors multiple underground sites and