HackDig : Dig high-quality web security articles for hackers

COVID-19: the impact of the pandemic in three IT areas

The impact of the COVID-19 pandemic on society has led to a digital transition period with organizations and businesses having to rapidly rewrite their plans for the immediate future. As companies set out to address these new scenarios, the need for expert technical support has become increasingly evident, and vital in order for investment and implementation
Publish At:2020-12-02 09:10 | Read:218 | Comments:0 | Tags:Adaptive Defense Business News b2b covid-19 MSP WatchGuard

16 hardware and software platforms hacked in minutes. A contest or business reality?

To date in 2020, the Spanish Data Protection Agency (AEPD) has reported 837 security breaches affecting personal data, which is 201 more than those reported in the same period last year. Yet one in three of these are still without a security incident response plan, which underlines how the security teams charged with this task and with providing a forensic r
Publish At:2020-11-17 10:22 | Read:298 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b cyberat

The cold cyberwar and geopolitics: which weapons can protect endpoints?

Following World War II, the technological and arms race that began between the United States and the Soviet Union became known as the Cold War. The Cold War nowadays has entered into a new phase: cyberwarfare. Technology is increasingly being used to gain a competitive edge in global geopolitics, and governments are increasingly concerned about the strength
Publish At:2020-11-05 09:45 | Read:383 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b covid-1

Numerous points of entry lead to multi-million euro penalties for data security breaches.

Data security breaches are now among the most common serious incidents affecting businesses. In this respect, 2019 was a bad year for companies. It was a year that saw some of the highest penalties imposed for violating data protection regulations, with examples such as the 50 million euro fine on Google LLC for non-compliance with GDPR transparency rules an
Publish At:2020-10-29 09:40 | Read:378 | Comments:0 | Tags:Adaptive Defense Business News b2b data breach data control

Artificial Intelligence, disruptive innovation in cybersecurity

In the current reality in which the sheer number, professionalization, and sophistication of adversaries has forced organizations to bolster security policies and develop specific processes to prevent, detect, investigate, contain, and eradicate technologically advanced cyberattacks, Artificial Intelligence has burst onto the cybersecurity scene. AI has, in
Publish At:2020-10-22 06:27 | Read:273 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

Five keys for mitigating cybersecurity breaches

A rapid and efficient response to incidents is a key part of any good cybersecurity strategy. As cyberattacks evolve at pace, IT departments start to question traditional methods of dealing with new criminal gangs and threats, and understand that there is no single or simple way to counter them, given the complexity of the digital environment. Today, an effe
Publish At:2020-10-14 11:15 | Read:374 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

Carlos Arnal: “The economic impact of a DNS attack is too great to ignore the vulnerabilities that would enable it”

One of the main problems with DNS attacks is the increasing cost of the damage they cause, as well as their rapid evolution and the diverse range of attack types. Data exfiltration over DNS is a major concern in corporate environments. In order to protect themselves, organizations are prioritizing the security of network endpoints and improving DNS traffic m
Publish At:2020-09-30 12:13 | Read:338 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b dns int

Monitoring and response to vulnerabilities to mitigate cybersecurity risks

Cybersecurity is a cause for serious concern among companies. New serious or critical vulnerabilities are coming to light almost every day and cybercriminals look to exploit them, not to mention the numerous lower risk security holes that are also detected. PandaLabs, the cybersecurity laboratory at Panda Security, detected 76,000 alerts for exploits in 2019
Publish At:2020-09-30 12:13 | Read:352 | Comments:0 | Tags:Adaptive Defense Business b2b patch management vulnerabiliti

How to take your company into the cloud and telecommute securely

A growing number of organizations are opting to migrate their data and applications to the cloud given the numerous benefits that this delivers: cost savings on server maintenance, scalability, and easy access to data from anywhere, to name just three. The latter is particularly important today due to the massive increase in telecommuting in response to the
Publish At:2020-09-15 08:10 | Read:846 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cl

Zero-day attacks: the cyber equivalent of COVID-19

Cybersecurity has changed markedly over the last few years. The first malware dates back to the 1970s and led to the creation of the first antivirus -Reaper-, designed to detect computers infected with the malware Creeper and remove it. Since then, cybersecurity has become increasingly important and is now an essential consideration for any organization. Thi
Publish At:2020-08-28 18:29 | Read:530 | Comments:0 | Tags:Adaptive Defense Business Malware b2b covid-19 zero day cybe

Remote working, global power plays are shifting the threat landscape

The COVID-19 pandemic has pushed companies into a remote workforce situation that many were vastly unprepared for. Remote workers don’t have the same protection as they would have in the traditional corporate network. This has not only increased the burden for IT teams, but without advanced cybersecurity in place, has widened the attack surface, giving attac
Publish At:2020-08-13 07:37 | Read:659 | Comments:0 | Tags:Adaptive Defense Business b2b ITWeb Security Summit remote w

Twitter insiders? Don’t get accused of spying because of your staff

Just ten days after one of the biggest hacks in the history of Twitter, while both internal and external investigators continue to try figuring out exactly what happened, the social network is once again the subject of brand-tarnishing headlines, this time centered on the company’s poor internal security highlighted by the recent case of Twitter sub-contract
Publish At:2020-08-06 08:23 | Read:820 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cy

Garmin: the latest wearable attacked by ransomware and a controversial ransom

Garmin, the developer of smartwatches and GPS devices, along with its popular app for monitoring physical exercise and sharing results with other services and devices, has become one of the latest victims of ransomware. On July 27, the company announced the recovery of normal activity after the attack from the WastedLocker ransomware, which first appeared ea
Publish At:2020-08-04 10:03 | Read:612 | Comments:0 | Tags:Adaptive Defense Business Malware News Advac advanced cybers

Don’t let ransomware shut your business down!

If there is one characteristic that defines cybercrime today, it is the capacity to evolve and adapt to new environments and the ability to find ways of evading the cybersecurity measures taken by victims. Ransomware is no exception. One of the main features of ransomware as a threat, in addition to kidnapping data, is that it is constantly reinventing itsel
Publish At:2020-07-30 16:00 | Read:486 | Comments:0 | Tags:Adaptive Defense Malware News advanced cybersecurity b2b Ran

EMOTET reemerges after months in hiding

First identified in 2014, Emotet has continued to infect systems and compromise users until now, which has kept it in the news far longer than other threats from the same year. The last version of Emotet was seen back in February, when it was distributed across WLAN networks, highlighting how this malware had evolved from a banker Trojan aimed at stealing fi
Publish At:2020-07-28 15:54 | Read:605 | Comments:0 | Tags:Adaptive Defense Malware News b2b emotet tips


Tag Cloud