CCS Home Page
CCS ISO 9001 Quality Registered

Blog Layout

CCS Cyber Security News - 27th April 2023

In today's digital age, it's crucial to stay up to date with the latest trends in cybersecurity to protect yourself and your business from potential threats. Our newsletter provides you with the most current and relevant information on cyber-attacks and ransomware, along with insights into the latest cybersecurity developments. Our team of experts’ curates the most important news and presents it to you in a concise and easy-to-digest format. Stay informed and stay protected with our Cyber Attacks, Ransomware, and Cyber Security News.

Cyber Attacks

The Yellow Pages Canada company has confirmed to Infosecurity that it has been the victim of a cyber-attack.


“As soon as we became aware of the attack, we immediately commenced a thorough investigation into this issue with the assistance of external cybersecurity experts to contain the incident and ensure that we had secured our systems,” senior vice president and chief financial officer, Franco Sciannamblo.


Further details on the story

14 Canadian Casinos Shut Down Since April 16


Canada’s Gateway Casinos & Entertainment Ltd. has officially confirmed that the company has been the subject of a cyberattack. All 14 of the company’s casinos in the province of Ontario were shut down starting with Casino Rama Resort which closed on April 16th. The casinos were hit with a ransomware attack that reportedly created an IT outage.


Further details on the story

Cyberattack - Western Digital hit by hackers 


Last month Western Digital (WD) was hit by a hacker attack. The hackers claim to have more than 10TB of sensitive data stolen from the storage company and are demanding more than $10 million in ransom.   The hackers shared a sample of the stolen information with the tech bloggers, who verified its legitimacy.


Further details on the story

Ransomware Attacks

Ransomware gang exploiting unpatched Veeam backup products 


Cyber criminals with links to multiple virulent ransomware strains are exploiting a recently disclosed vulnerability in Veeam’s Backup & Replication product, threat analysts have warned. 


Researchers at WithSecure have issued an alert after uncovering evidence that a notorious cyber criminal gang is exploiting a recently disclosed vulnerability in Veeam Backup & Replication data backup and recovery software to access its victims’ networks.


Further details on the story

Security News

Grant Thornton – How to plan for third-party cybersecurity incident management.


Expanding regulations and stakeholder expectations could require organisations to report cybersecurity incidents more quickly — even incidents at a third-party vendor or supplier.



Further Information

Saas Security: The need for continuous sustenance.


Today, the perimeter has evolved again due to the broad adoption of cloud-based infrastructure and applications. Therefore, security leaders are pressured to develop and implement a thorough SaaS security plan.


Further Information

Let’s take a look at some of the best password managers for Google Chrome currently available.


It’s estimated that 65% of people don’t trust password managers. That’s despite 60% of people having experienced a data breach. Even more concerning is the fact that many of these people are IT professionals.  The bottom line is simple, a password manager will save you time and hassle. It will also help to ensure you have strong passwords and reduce the risk of future data breaches.  You simply need to know the 10 best password manager for Google Chrome. 


Further Information

Sophos released its Active Adversary Report for Business Leaders 


The 2023 Active Adversary Report for Business Leaders presents what the Sophos X-Ops Incident Response (IR) team has learned about the current adversary landscape from tackling security crises around the world. The Sophos report is based on data from over 150 cases selected from the 2022 workload of the IR team. They provide more detail on the demographics represented in this analysis at the end of the report.



Further Information

Share by: