HackDig : Dig high-quality web security articles for hacker

Cisco fixes a static default credential issue in Smart Software Manager tool

Cisco has released security updates to address 17 vulnerabilities affecting its networking and unified communications product lines. Cisco has released security patches to fix 17 vulnerabilities affecting its networking and unified communications product lines. The types of fixed vulnerabilities include remote access and code execution, elev
Publish At:2020-02-20 11:02 | Read:71 | Comments:0 | Tags:Breaking News Security CISCO Hacking information security ne

To Rank or Not to Rank Should Never Be a Question

Let’s face it: Vulnerability management is not what it used to be a decade ago. Actually, it is not what it used to be a couple of years ago. Vulnerability management is one of those ever-evolving processes. Whether it is because of compliance mandates, board demands, an overall desire to reduce risk, all of these objectives or none, almost every organ
Publish At:2020-02-20 10:49 | Read:89 | Comments:0 | Tags:Endpoint Risk Management Software & App Vulnerabilities Clou

What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

The recently published IBM X-Force Threat Intelligence Index 2020 pointed out that over 8.5 billion records were compromised in 2019, a figure that’s more than 200 percent greater than the number of records lost in 2018. It also determined that scanning and exploitation of vulnerabilities have increased from just 8 percent of attacks in 2018 to nearly
Publish At:2020-02-20 10:49 | Read:70 | Comments:0 | Tags:CISO Energy & Utility Security Services Brute-Force Attack C

Phishing techniques: Asking for sensitive information via email

IntroductionEmail has been a critical part of our everyday communications since the 1990s. Thanks to its affordability and ease of use, email allows users to conduct business deals, stay in touch with their family and friends, and receive promotional materials from their favorite brands. However, the use of this messaging medium isn’t risk-free.Phisher
Publish At:2020-02-20 10:44 | Read:85 | Comments:0 | Tags:Phishing

Hack the Box (HTB) machines walkthrough series — Heist

Today we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named Heist.HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple enumeration plus pentest) in
Publish At:2020-02-20 10:44 | Read:87 | Comments:0 | Tags:Capture the Flag

Scammers Use Fake Website to Masquerade as Burning Man Organizers

Scammers created a fake website to masquerade as the organizers of Burning Man and to trick people into buying non-existent tickets for the arts event.Kaspersky Lab discovered a fraudulent website that attempted to capitalize on people’s interest in attending the event. The site leveraged the same colors, fonts and design as “burningman.org,̶
Publish At:2020-02-20 10:40 | Read:65 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Burning

MGM Resorts hacked: 10.6 million guests have their personal data exposed on hacking forum

Over 10 million people who have stayed at MGM Resorts hotels – including Twitter boss Jack Dorsey and pop idol Justin Bieber – have had their personal details posted online by hackers.The security breach, publicised by ZDNet and security researcher Under the Breach, saw the records of 10,683,188 former guests – including names, postal addre
Publish At:2020-02-20 10:40 | Read:50 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data breac

Combatting Coronavirus Phishing and Malware Attacks

Attackers often look to take advantage of spikes in trends to launch attacks and trick innocent consumers into downloading malware or parting with sensitive, often financial, information.We saw it at the end of last year, when hackers took advantage of the increase in communication around Strong Customer Authentication (SCA) to steal credentials, as well as
Publish At:2020-02-20 10:05 | Read:44 | Comments:0 | Tags: Virus

Attacking the Organism: Financial Services

When it comes to high-value assets, few industries can come close to financial services. It’s not just the obvious fact that banks are giant warehouses of money—banks represent critical pieces of infrastructure that entire economies rely upon. And while the likes of George (don’t call him Baby Face) Nelson may have made a decent living robbing physical
Publish At:2020-02-20 09:43 | Read:95 | Comments:0 | Tags:INDUSTRY INSIGHTS Application Security

Ring Rolls Out Mandatory 2FA, New Privacy Controls

Amazon-owned home security and smart home company Ring this week announced new security and privacy features for all of its users.Following reports of hackers accessing Ring cameras and spying on people or harassing them, the company is apparently working on addressing these issues, and has started with a CES announcement on a new Control Center for both iOS
Publish At:2020-02-20 09:43 | Read:71 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Compliance Ident

CrowdStrike Co-Founder and CTO Steps Down to Launch Nonprofit Policy Accelerator

CrowdStrike Names New CTO as Dmitri Alperovitch Leaves to Start Policy Accelerator Focused on National Security and Foreign Policy ChallengesEndpoint security firm CrowdStrike announced on Wednesday that Michael Sentonas has been appointed chief technology officer (CTO) after Dmitri Alperovitch decided to leave the company to launch a non-profit policy accel
Publish At:2020-02-20 09:43 | Read:29 | Comments:0 | Tags:NEWS & INDUSTRY Management & Strategy

ZeroFOX Raises $74 Million to Expand Social Media Threat Protection Business

Baltimore, MD-based ZeroFOX has raised $74 million in a new funding round led by Intel Capital and including existing vendors NEA, Highland Capital Partners, Redline Capital Management, Hercules Capital and Core Capital. It brings the total funding raised by ZeroFOX to $154.2 million.ZeroFOX delivers an AI-powered platform that protects users and brands from
Publish At:2020-02-20 09:43 | Read:63 | Comments:0 | Tags:NEWS & INDUSTRY Cloud Security Cybercrime

Coming to a Conference Room Near You: Deepfakes

Could Deepfakes be a Risk to Your Company?Deepfake technology isn’t just something reminiscent of a Hollywood thriller, although the technology was first used in movie studios when film editors wanted to replace the faces of stunt doubles with the real stars. Over years of development, this has improved to the point where it is hard to spot in a movie. For e
Publish At:2020-02-20 09:43 | Read:50 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management

Ransomware Wreaks Havoc Across Europe

Security experts have this week warned Italian and Swiss businesses to be on their guard as ongoing ransomware campaigns continue to target vulnerable systems.In Switzerland, the Reporting and Analysis Centre for Information Assurance (Melani) issued an alert for local firms, claiming that it has already been forced to deal with a dozen cases where SMEs and
Publish At:2020-02-20 08:40 | Read:116 | Comments:0 | Tags:No Tag

Over 2000 UK Government Devices Go Missing in a Year

Over 2000 mobile devices used by UK government employees have gone missing in the space of a year, with a significant number unencrypted, according to new Freedom of Information (FOI) data.Requests were sent by global communications company Viasat to 47 government departments, with full or partial replies received back from 27 of them.During the period June
Publish At:2020-02-20 08:40 | Read:67 | Comments:0 | Tags:No Tag


Share high-quality web security related articles with you:)


Tag Cloud