HackDig : Dig high-quality web security articles for hackers

The Past, Present and Future of Security Information and Event Management (SIEM)

With the release of the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we feel that it is an appropriate time to reflect on the evolution of SIEM over the years. Starting out as a tool originally designed to assist organizations with compliance, SIEM evolved into an advanced threat detection system, then into an investigati
Publish At:2020-02-24 09:37 | Read:639 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Advanced

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

One of the most disturbing security trends over the last few years has been the rise of the meta attack. The scope of this type of attack is far larger and wider than a threat designed to achieve a specific goal. These advanced cyberattacks are so significant, in fact, that they could sink an entire organization if it doesn’t take the time to install l
Publish At:2017-10-06 10:25 | Read:3345 | Comments:0 | Tags:CISO Incident Response Risk Management Advanced Attacks Adva

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:3129 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

Co-authored by Steve Stone After finalizing initial analysis, IBM X-Force Incident Response and Intelligence Services (IRIS) concluded that the Petya variant attacks that started on Tuesday, June 27, were intended as destructive attacks against Ukraine, rather than a means for cybercriminals to make money from ransom payouts. In other words, this attack was
Publish At:2017-06-30 03:45 | Read:4063 | Comments:0 | Tags:Malware Advanced Attacks Advanced Malware Advanced Threats I

How a CISO Can Use Home Field Advantage to Defeat Attackers

Summer is over and as fall starts to settle in, football season starts again. It was while reviewing my son’s upcoming schedule that he pointed out that some of the earlier games in the season are against teams with more skilled players. However, he quickly pointed out that those games are at home and that this would be a big advantage to him and his t
Publish At:2014-09-24 22:50 | Read:3153 | Comments:0 | Tags:CISO Advanced Attacks Advanced Persistent Threat (APT) attac

Operation Arachnophobia: An Introduction

We recently had the opportunity to collaborate with ThreatConnect’s Intelligence Research Team (TCIRT) to conduct follow-up reporting on threat group activity that appears to originate from Pakistan. The TCIRT originally reported on this activity in August 2013 in their “Where There is Smoke, There is Fire” blog post.  This post covered a threat group using
Publish At:2014-08-09 22:28 | Read:4080 | Comments:0 | Tags:Threat Intelligence Threat Research advanced attacks APT tar


Share high-quality web security related articles with you:)