HackDig : Dig high-quality web security articles for hackers

Lessons from COVID-19 Cyberattacks: Where Do We Go Next?

We need to learn from the attacks and attempts that have occurred in order to prepare for the future.Cyber actors have shown us during the pandemic that they will let no opportunity go by without trying to take advantage. We've seen them prey upon the fear and concern around COVID-19 with phishing attacks, and capitalize on security weaknesses as organizatio
Publish At:2020-07-02 10:58 | Read:51 | Comments:0 | Tags:No Tag

Netgear is releasing fixes for ten issues affecting 79 products

Netgear is addressing ten vulnerabilities affecting nearly 80 of its products, including issues discovered at the Pwn2Own hacking competition. Netgear is releasing security patches to address ten vulnerabilities affecting nearly 80 of its products. Some of the vulnerabilities were discovered during the Pwn2Own Tokyo 2019 hacking contest and reported throu
Publish At:2020-07-02 08:29 | Read:57 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

Trickbot Malware Using Screen Resolution Checks as Anti-VM Tactic

Security researchers spotted Trickbot malware checking the screen resolution as a means of evading analysis on a virtual machine (VM).Digital security firm MalwareLab came across a sample of the trojan that checked to see whether a computer’s screen resolution was either 800×600 or 1024×768. It then terminated if it found that the screen reso
Publish At:2020-07-02 08:07 | Read:136 | Comments:0 | Tags:IT Security and Data Protection Latest Security News evasion

5 ways to reduce risky habits online

Reading Time: ~ 4 min. After surveying more than 10,000 people in 50 states about their cybersecurity habits, we wound up with some pretty surprising results. Like the fact that tech experts demonstrate riskier behaviors than average Americans. But the most significant result of all was the fact that most Americans are more confident than they should be when
Publish At:2020-07-02 06:20 | Read:85 | Comments:0 | Tags:Home + Mobile phishing

Zoom Got Big Fast. Then Videobombers Made It Rework Security

Back in March as the coronavirus pandemic gathered steam in the U.S., a largely unheralded video-conferencing service suddenly found itself in the spotlight.And just as quickly as Zoom became a household name for connecting work colleagues, church and school groups, friends, family, book clubs and others during stay-at-home lockdowns, it also gained a reputa
Publish At:2020-07-02 03:19 | Read:110 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Data Protection Priva

Understanding the Purpose of Security Controls and the Need for Compliance

What are the brakes on a car designed to do? I have asked this question many times when speaking to customers or organizations who were dipping their toes into the audit space. Invariably, their answer was, “To stop the car.” At this point, I would then ask, “Then how do you get where you want to go?”What Is the Purpose of Controls and a Compliance Program?W
Publish At:2020-07-02 00:24 | Read:112 | Comments:0 | Tags:Featured Articles Security Controls audit Complaince IT Cont

A Checklist for Preparing for Your Organization’s Next PCI Audit

Organizations cannot afford to neglect their PCI compliance obligations. According to its website, PCI could punish offending organizations with a monetary penalty ranging in value from $5,000 to $100,000 per month. These fines could spell the end for a small business.Acknowledging those consequences, organizations need to make sure they’re PCI compliant. Mo
Publish At:2020-07-02 00:24 | Read:97 | Comments:0 | Tags:PCI compliance pci audit

Cyber Security Roundup for July 2020

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, June 2020.Australian Prime Minister Scott Morrison announced a sophisticated nation-state actor is causing increasing havoc by attacking the country’s government, corporate institutions, and his country's crit
Publish At:2020-07-01 23:06 | Read:88 | Comments:0 | Tags:No Tag

Ransomware Gangs Don’t Need PR Help

We’ve seen an ugly trend recently of tech news stories and cybersecurity firms trumpeting claims of ransomware attacks on companies large and small, apparently based on little more than the say-so of the ransomware gangs themselves. Such coverage is potentially quite harmful and plays deftly into the hands of organized crime. Often the rationale behind
Publish At:2020-07-01 22:45 | Read:116 | Comments:0 | Tags:Ransomware ransomware

Two Musts for Managing a Remote Workforce: Identity Governance and Lifecycle

Rethinking These Familiar Terms to Address New Ways of WorkingIdentity governance and lifecycle have always been fundamental to controlling user access and visibility into access activity in the workplace. But in a time when “the workplace” has been recast to mean every user’s home and a multitude of devices (including personal devices), these capabilities t
Publish At:2020-07-01 19:35 | Read:75 | Comments:0 | Tags:INDUSTRY INSIGHTS Identity & Access

Microsoft Issues Out-of-Band Patches for RCE Flaws

Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.Microsoft has released two out-of-band security patches for remote code execution (RCE) laws in the Windows Codecs Library. The vulnerabilities affect both Windows 10 and Windows Server 2019.Windows Codecs Library provides support for different photo an
Publish At:2020-07-01 19:32 | Read:87 | Comments:0 | Tags:No Tag

New MacOS Ransomware Hides in Pirated Program

A bogus installer for Little Snitch carries a ransomware hitchhiker.New malware found on a Russian forum takes advantage of the apparently insatiable appetite for pirated software. In this case, a torrent for application firewall Little Snitch actually opens into a downloader for MacOS-based ransomware.According to researchers at Malwarebytes, there are obvi
Publish At:2020-07-01 19:32 | Read:83 | Comments:0 | Tags:No Tag

DHS Shares Data on Top Cyberthreats to Federal Agencies

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.The US federal government's civilian agencies see many of the same attacks as the private sector, fending off ransomware, cryptominers, and backdoors, according to the an alert
Publish At:2020-07-01 19:32 | Read:68 | Comments:0 | Tags:No Tag

NTT Data Center Subsidiary Settles with FTC in Privacy Spat

A subsidiary of Japanese tech communications giant NTT has settled with the Federal Trade Commission over a complaint that it misled customers about its participation in the Privacy Shield framework.NTT Global Data Centers used to be called RagingWire, but the Japanese telco acquired a majority 80% stake in the business in 2014, buying the remaining stock in
Publish At:2020-07-01 18:32 | Read:100 | Comments:0 | Tags:No Tag

Malware Uses Postal App Lure to Send SMS Messages and Steal Data

A new version of Android malware, which exfiltrates and sends SMS messages, has been detected stealing financial and application data and reading account information and contact lists.According to research by Cybereason, the malware, which it calls FakeSpy, is under constant development and has been active for over three years. Research found the a
Publish At:2020-07-01 17:20 | Read:96 | Comments:0 | Tags:No Tag

Announce

Share high-quality web security related articles with you:)

Tools

Friend Links