HackDig : Dig high-quality web security articles for hackers

What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring

We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS controls as they provide a critical baseline for maintaining our security framework and keeping
Publish At:2020-04-09 02:33 | Read:842 | Comments:0 | Tags:File Integrity Monitoring attack vector cyber attack File In

How Just Opening A Malicious PowerPoint File Could Compromise Your PC

A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office.The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threa
Publish At:2017-08-14 18:50 | Read:4721 | Comments:0 | Tags:Cyber Attack hacking news Malware Microsoft office Microsoft

WannaCry vs. Petya: Keys to Ransomware Effectiveness

By Daniel MiesslerWith WannaCry and now Petya we’re beginning to see how and why the new strain of ransomware worms are evolving and growing far more effective than previous versions.I think there are 3 main factors: Propagation, Payload, and Payment.*Propagation: You ideally want to be able to spread using as many different types of techniques a
Publish At:2017-06-29 06:35 | Read:3501 | Comments:0 | Tags:#WannaCry cyber attack cybersecurity cyberwar cyberwarfare d

Post #WannaCry Reaction #127: Do I Need a Pen Test?

By Daniel MiesslerIn the wake of WannaCry and other recent events, everyone from the Department of Homeland Security to my grandmother are recommending penetration tests as a silver bullet to prevent falling victim to the next cyber attack. But a penetration test is not a silver bullet, nor is it universally what is needed for improving the security po
Publish At:2017-05-20 01:45 | Read:3721 | Comments:0 | Tags:#WannaCry cyber attack daniel meissler ioactive penetration

How to Protect Your E-commerce Business from Cyber Attacks

Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.Whether small, medium or large, every business is, sadly, at the mercy of hackers who will exploit every opportunity they get to breach sen
Publish At:2017-03-23 16:10 | Read:6106 | Comments:11 | Tags:Cyber Security Featured Articles cyber attack E-commerce SSL

Hacking Robots Before Skynet

By Cesar Cerrudo (@cesarcer)and Lucas Apa (@lucasapa)Robots are goingmainstream in both private and public sectors - on military missions,performing surgery, building skyscrapers, assisting customers at stores, as healthcareattendants, as business assistants, and interacting closely with our familiesin a myriad of ways. Robots are already showing up in many
Publish At:2017-03-01 15:50 | Read:32318 | Comments:0 | Tags:cesar cerrudo cyber attack cybersecurity hacker industrial r

A US minor is behind the cyber attack that hit Brussels airport after bombings

Prosecutors confirmed that the failed cyber attack on Brussels airport a few hours after 2016 bombings was launched by a US minor. Prosecutors confirmed that the failed cyber attack on Brussels airport a few hours after dramatic 2016 bombings in Belgium’s capital was launched by a US minor. On March 2016, suicide bombers attacked Zaventem airport and a
Publish At:2017-02-12 21:50 | Read:3977 | Comments:0 | Tags:Breaking News Cyber Crime Brussels airport cyber attack Hack

Lloyds Bank Suffered Massive DDoS Cyber Attack Lasting Two Days

Lloyds Banking Group was reportedly hit by a massive distributed denial of service (DDoS) attack lasting two days, significantly disrupting its online banking services.According to reports, the British financial institution was one of several UK banks targeted by the cyber attacks, which ran from Wednesday, January 11 to Friday, January 13.The Guardian repor
Publish At:2017-01-23 20:40 | Read:5148 | Comments:0 | Tags:Latest Security News cyber attack DDoS Lloyds DDOS

Remotely Disabling a Wireless Burglar Alarm

By Andrew Zonenberg @azonenbergCountless movies feature hackers remotely turning offsecurity systems in order to infiltrate buildings without being noticed. Buthow realistic are these depictions? Time to find out.Today we’re releasing information on a critical securityvulnerability in a wireless home security system from SimpliSafe. This system consis
Publish At:2016-11-19 20:15 | Read:7555 | Comments:0 | Tags:0-day 0day alarm Andrew Zonenberg burglar cyber attack hacki

Anti-Phishing: How the DNC could have prevented the Russian cyberattack

It’s 3:45 pm on Friday and you are ready to be done for the week. A last-minute email from your boss pops into your inbox. It’s a Google file invitation that says you need to update this document before the end of the day. Being the dedicated employee that you are, you click the link and end up at a Google login page. The login page displays your name
Publish At:2016-11-04 02:25 | Read:4630 | Comments:0 | Tags:Phishing cyber attack election phishing spear

10 Best Practices In IT Security Management Automation

In my last blog post, I introduced the topic of automation and how it can help improve security posture. In this post, we’ll be covering some of the risks automation can mitigate against.Data Breaches and Cyber AttacksA recent survey by ISACA on organization preparedness indicated that only 38% of businesses were confident they were prepared to respond to a
Publish At:2016-09-16 17:10 | Read:3610 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyber atta

A malware was found in Iran petrochemical complexes, but it’s not linked to recent incidents

The head of Iran’s civilian defense confirmed that a malware was found in petrochemical complexes, but it hasn’t caused the fires under investigation. Last week, I reported the news related to a series of fires at Iranian petrochemical plants. The Iran’s Supreme National Cyberspace Council started an investigation to discover if the incidents at oil an
Publish At:2016-08-29 12:40 | Read:4072 | Comments:0 | Tags:Breaking News Cyber warfare Malware critical infrastructure

Iran investigates possible cyber attacks behind a string Oil Industry incidents

Iran ’s cyberspace security authorities are investigating a string of fires in the country oil and gas facilities. Incidents or cyber sabotage? Once again, something of strange is happening in Iran, the Government of Teheran is investigating a recent string of incidents occurred in critical infrastructure in the country. The Iran’s Supreme National Cyb
Publish At:2016-08-19 15:05 | Read:4008 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Security critical

Threat Recap: Week of May 9th

  A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. Microsoft and Adobe Vulnerabilities Revealed In the past week, Microsoft announced a vulnerability in Windows, which would allow at
Publish At:2016-05-13 16:35 | Read:3902 | Comments:0 | Tags:Headlines adobe cyber attack Google Breach GPS secuirty Hack

Maritime Security: Hacking into a Voyage Data Recorder (VDR)

by Ruben Santamarta @reversemodeIn 2014, IOActive disclosed a series of attacks that affect multiple SATCOMdevices, some of which are commonly deployed on vessels. Although there is nodoubt that maritime assets are valuable targets, we cannot limit the attacksurface to those communication devices that vessels, or even large cruise ships,are usually equipped
Publish At:2015-12-09 21:10 | Read:11164 | Comments:0 | Tags:0day cyber attack Furuno hacking maritime piracy ruben santa


Tag Cloud