HackDig : Dig high-quality web security articles

Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why threat hunting should be a baseline activity
Publish At:2022-08-02 13:09 | Read:271 | Comments:0 | Tags:Advanced Threats Application Security Security Services Thre

Recovering Ransom Payments: Is This the End of Ransomware?

What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since even crypto leaves a money trail. Recovering ransomware payouts could lead to a sharp decline in exploits. Ransomware is still today’s top att
Publish At:2022-06-02 10:19 | Read:444 | Comments:0 | Tags:Advanced Threats Risk Management Security Services Cryptocur

Malicious Reconnaissance: What It Is and How To Stop It

You spend your days getting ready to stop threat actors. But even as you wonder, attackers could already be ‘casing the joint’.  Before any well-organized attack, skillful or professional attackers quietly snoop around, looking for chances to gain access. It’s called malicious reconnaissance — the unauthorized active monitoring
Publish At:2022-05-19 10:18 | Read:471 | Comments:0 | Tags:Risk Management Security Services threat actors 5G security

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence Index
Publish At:2022-05-09 10:09 | Read:1351 | Comments:0 | Tags:Advanced Threats Banking & Finance Data Protection Fraud Pro

Top 5 Cybersecurity Podcasts to Follow in 2022

One of my favorite parts about talking to cybersecurity professionals is asking how they landed in the industry. Few tell me about a straight path to their career, like attending college or earning a certification. Most launch into an interesting tale of their non-traditional career paths. When I share these stories, I’m often asked how someone can fi
Publish At:2022-03-17 10:08 | Read:2214 | Comments:0 | Tags:Intelligence & Analytics Software Vulnerabilities Advanced T

Expert Insights: What’s Next for Ransomware?

Last year, many organizations stopped talking about when the workforce would be back full-time in the office. Instead, they focused on how we build a hybrid work model for the future. 2021 was active and interesting – for lack of a better word. There’s a lot to say in terms of cyber crime in general and ransomware specifically. As we progress fu
Publish At:2022-03-03 10:08 | Read:651 | Comments:0 | Tags:Advanced Threats Data Protection Incident Response Threat Hu

Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data

Shopping online is an increasingly popular endeavor, and it has accelerated since the COVID-19 pandemic. Online sales during the 2021 holiday season rose nearly 9% to a record $204.5 billion. Mastercard says that shopping jumped 8.5% this year compared to 2020 and 61.4% compared to pre-pandemic levels. Cyber criminals are not missing this trend. The Ramnit
Publish At:2022-01-31 14:03 | Read:4054 | Comments:0 | Tags:Advanced Threats Malware Security Services ATM Malware Banki

A Journey in Organizational Resilience: Insider Threats

Very much like privacy concerns, insider threats may not be the first issue to come to mind when building an enterprise cyber resilience plan. However, they should be. Here is why: because as we noted in the first piece of this series, you want to be able to bend while others break. An insider threat is uniquely positioned to make you break in ways no other
Publish At:2021-11-22 13:35 | Read:3743 | Comments:0 | Tags:Incident Response Risk Management Security Services Advanced

Detections That Can Help You Identify Ransomware

One of the benefits of being part of a global research-driven incident response firm like X-Force Incidence Response (IR) is that the team has the ability to take a step back and analyze incidents, identifying trends and commonalities that span geographies, industries and affiliations. Leveraging that access and knowledge against the ransomware threat has r
Publish At:2021-10-20 19:23 | Read:2694 | Comments:0 | Tags:Intelligence & Analytics Software Vulnerabilities Advanced T

How to Report Scam Calls and Phishing Attacks

With incidents such as the Colonial Pipeline infection and the Kaseya supply chain attack making so many headlines these days, it can be easy to forget that malicious actors are still preying on individual users. They’re not using ransomware to do that so much anymore, though. Not since the rise of big game hunting, anyway. This term marks ransomware
Publish At:2021-10-14 15:27 | Read:3056 | Comments:0 | Tags:Advanced Threats Data Protection Identity & Access Incident

Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds

IBM X-Force has been tracking the activity of ITG23, a prominent cybercrime gang also known as the TrickBot Gang and Wizard Spider. Researchers are seeing an aggressive expansion of the gang’s malware distribution channels, infecting enterprise users with Trickbot and BazarLoader. This move is leading to more ransomware attacks — particularly on
Publish At:2021-10-13 07:35 | Read:7663 | Comments:0 | Tags:Advanced Threats Security Services Threat Hunting Threat Int

The Real Cost of Ransomware

Ransomware is an expensive cybercrime and getting more so all the time. Payouts have risen massively in the past few years. But while ransomware payment amounts make headlines, the real costs go far beyond what’s paid to the attackers.  How Ransomware Works Now Ransomware has always been a problem. But in recent years, attackers have gotten reall
Publish At:2021-10-07 11:31 | Read:3047 | Comments:0 | Tags:Advanced Threats Incident Response Risk Management Security

Phishing Attacks Are Top Cyber Crime Threat, Easier Than Ever to Create and Deploy

Why is one of cyber crime’s oldest threats still going strong? The Anti-Phishing Working Group (APWG) reports that January 2021 marked an unprecedented high in the APWG’s records, with over 245,771 phishing attacks in one month. IBM X-Force’s 2021 Threat Intelligence Index found that phishing led to 33% of cyber attacks organizations had t
Publish At:2021-10-06 17:15 | Read:1721 | Comments:0 | Tags:Advanced Threats Incident Response Security Services cyber a

A Journey in Organizational Cyber Resilience Part 3: Disaster Recovery

Moving along our organizational resilience journey, we focus on disaster recovery (DR), the perfect follow-up to business continuity (BC) The two go hand-in-hand, often referenced as BCDR, and both are key to your cyber resilience planning. If you recall from the previous piece, NIST SP 800-34 calls out a separate disaster recovery plan, as it supports busi
Publish At:2021-09-27 12:37 | Read:4 | Comments:0 | Tags:Intelligence & Analytics Software Vulnerabilities Advanced T

How to Protect Against Deepfake Attacks and Extortion

Cybersecurity professionals are already losing sleep over data breaches and how to best protect their employers from attacks. Now they have another nightmare to stress over — how to spot a deepfake.  Deepfakes are different because attackers can easily use data and images as a weapon. And those using deepfake technology can be someone from inside
Publish At:2021-09-17 16:33 | Read:3524 | Comments:0 | Tags:Advanced Threats Data Protection Incident Response Risk Mana


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud