Regional Computer Crime Education and Enforcement Group

RCCEEG StL is an organization of law enforcement officers, prosecutors and computer professionals in the St. Louis area and surrounding counties; dedicated to providing manpower, technical and legal assistance in computer crime education and investigation. Because of the technical complexities associated with computer-related crimes and evidence, and limitations of personnel and training, the RCCEEG was formed.

St. Charles County Cyber Crime Task Force

The St. Charles County Cyber Crime Task Force serves St. Charles, Lincoln, Warren,Pike, Marion, Ralls Counties, and all their municipalities. It is staffed by personnel from the St. Charles County Police Department, Franklin County Sheriff's Department, Lincoln County Sheriff's Department and the Police Departments of O'Fallon, St. Peters, Wentzville, St. Charles City, and St. Louis City.

The Missouri Internet Crimes Against Children Task Force

The Missouri Internet Crimes Against Children Task Force (MOICAC), as one of 61 Task Force Units funded by the United States Department of Justice, Office of Juvenile Justice and Delinquency Prevention, serves criminal justice agencies and citizens of Missouri by offering investigative, forensic and prevention training and resources in an effort to fight online child exploitation. Click to go to thier website.

IC3.gov News

IC3.gov News

Krebs on Security

In-depth security news and investigation

Author: BrianKrebs
Posted: 05-21-15
Author: BrianKrebs
Posted: 05-21-15
Author: BrianKrebs
Posted: 05-20-15
Author: BrianKrebs
Posted: 05-18-15
Author: BrianKrebs
Posted: 05-18-15

CERT Recently Published Vulnerability Notes

KCodes NetUSB is vulnerable to a buffer overflow via the network that may result in a denial of service or code execution.
Author: CERT
Posted: 05-19-15
Subrion CMS is vulnerable to SQL injection from authenticated users when a browser cookie is modified in a certain way.
Author: CERT
Posted: 05-08-15
Bomgar Remote Support version 14.3.1 and possibly earlier versions deserialize untrusted data without sufficient validation,allowing an attacker to potentially execute arbitrary PHP code.
Author: CERT
Posted: 05-05-15
ICU Project ICU4C library,versions 52 through 54,contains a heap-based buffer overflow and an integer overflow.
Author: CERT
Posted: 05-04-15
EMC AutoStart,version 5.5.0 and earlier,is vulnerable to remote command execution via specially crafted packets.
Author: CERT
Posted: 04-30-15