HackDig : Dig high-quality web security articles for hacker

Link Arms Against the Attackers: Observations from the 2016 Cisco ASR

Remember 2007, when the underground economy began to flourish, using simple protocols and static subnet ranges to control their infrastructure? That was the same year Cisco published the first Annual Security Report (ASR). Nine years later, the drumbeat of cyberthreats grow louder, but the actors and threats are familiar, just as John reminded us when this y
Publish At:2016-01-27 03:30 | Read:1665 | Comments:0 | Tags:Security 2016 ASR Active Threat Analytics cisco-ata incident

Hiding in Plain Sight: Malware’s Use of TLS and Encryption

IntroductionTLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a web server and client and is supported by t
Publish At:2016-01-25 15:20 | Read:1187 | Comments:0 | Tags:Security 2016 Annual Security Report 2016 ASR encryption mal

Overcoming the DNS “Blind Spot”

[ed. note – this post was authored jointly by John Stuppi and Dan Hubbard]The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often a critical step in identifying and containing mal
Publish At:2016-01-22 15:00 | Read:1340 | Comments:0 | Tags:Security 2016 Annual Security Report 2016 ASR dns Threat Res

Why Aging Infrastructure Is a Growing Problem

Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software.However, as we relate in the
Publish At:2016-01-21 20:55 | Read:1431 | Comments:0 | Tags:Security 2016 Annual Security Report 2016 ASR infrastructure

The Value of Collaboration in Weakening Attackers

Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries’ ability to operate.As detailed in the Cisco 2016 Annual Security Report, recent collaborative efforts between Cis
Publish At:2016-01-21 02:50 | Read:1416 | Comments:0 | Tags:Security 2016 Annual Security Report 2016 ASR angler SSHPsyc

Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report

Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and res
Publish At:2016-01-19 14:40 | Read:927 | Comments:0 | Tags:Security 2016 Annual Security Report 2016 ASR cybersecurity


Share high-quality web security related articles with you:)


Tag Cloud