HackDig : Dig high-quality web security articles

Your new car may be safer and smarter, but is it cyber-secure?

The auto industry reached an important milestone in 2020: more than half of the cars sold globally included internet connectivity as a standard feature. Modern vehicles have started to resemble mobile supercomputers, with each one containing millions of lines of code and able to process vast amounts of data. They’ve also begun integrating with mobile
Publish At:2021-09-22 09:35 | Read:56 | Comments:0 | Tags:App Security Mobile Security connected cars cyber security h

Understanding the Benefits of Managed Cyber Services

As part of our upcoming attendance at the International Cyber Expo & International Security Expo, we were lucky enough to sponsor The Cyber Security Webinar Series with Nineteen Group and Grey Hare Media.Both Philip Ingram MBE and Emanuel Ghebreyesus, strategic account director for Tripwire, spoke about several topics including:The increasing complexity
Publish At:2021-09-15 00:39 | Read:193 | Comments:0 | Tags:Cyber Security managed services Podcasts Services cyber

A Cure for a Disheartened Cybersecurity Professional

Data breaches and ransomware attacks aren’t just still occurring. They’re also becoming more frequent. According to ZDNet, the number of ransomware attacks detected and blocked by one security firm grew 715% year-over-year in 2020 alone. Another security company calculated the total number of ransomware attacks for the year to be around 65,000, wrote NPR. Th
Publish At:2021-07-22 05:53 | Read:534 | Comments:0 | Tags:Cyber Security detection MITRE ATT&CK Tripwire Enterprise se

Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors every year. Figures from the United Kingdom show similar levels of criminal activity targeting seniors.Most of the elder fraud schemes are financially d
Publish At:2021-06-14 05:35 | Read:617 | Comments:0 | Tags:Cyber Security cybercrime Fraud Phishing Scams scam

Protecting a New Vulnerable Population on the Internet

On a Mission of ProtectingAbraham Lincoln is credited with saying that “A lawyer’s time and advice are his stock and trade.” Whether the quote is mis-attributed to Lincoln is irrelevant to the greater message, which is that attorneys are “knowledge workers.” To state it as bluntly as one attorney once explained to an executive where I worked, “My knowledge w
Publish At:2021-06-07 03:05 | Read:658 | Comments:0 | Tags:Cyber Security cybersecurity Internet internet security scam

Survey: Only 39% of Orgs Have Ability to Retain Cyber Security Talent

The cyber security skills gap was a problem prior to the pandemic. In a survey of 342 security professionals released in early 2020, Tripwire found that 83% of security experts felt more overworked going into the new year compared to how they felt at the start of 2019. Tripwire asked respondents to elaborate on that sentiment. In response, almost the same pr
Publish At:2021-05-13 02:47 | Read:799 | Comments:0 | Tags:Featured Articles Cyber Security retaining talent skills gap

Ghidra 101: Creating Structures in Ghidra

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effec
Publish At:2021-04-13 02:07 | Read:759 | Comments:0 | Tags:Cyber Security IT Security and Data Protection data types Gh

Integrity – It’s a Matter of Trust

When you think of the cybersecurity “CIA” triad of Confidentiality, Integrity, and Availability, which one of those is most important to your organization? From a privacy standpoint, confidentiality reigns supreme. Confidentiality is so important that it is codified into many of the cyber regulations of recent years, most notably the California Con
Publish At:2021-04-01 05:03 | Read:912 | Comments:0 | Tags:Cyber Security CIA Integrity NIST Cybersecurity Framework

Ransomware on the Rise: How to Keep You & Your Company Safe

Due in large part to COVID-19 and the increased prevalence of remote work, ransomware attacks dominated 2020, and experts predict there will be at least twice as many cases of data theft in the new year.The U.S. Cybersecurity & Infrastructure Security Agency defines ransomware as “a type of malicious software, or malware, designed to deny access to a com
Publish At:2021-03-24 13:33 | Read:999 | Comments:0 | Tags:Cyber Security malware ransomware

Ghidra 101: Loading Windows Symbols (PDB files)

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effec
Publish At:2021-03-09 03:02 | Read:717 | Comments:0 | Tags:Cyber Security database Ghidra Windows

The Humanity and Evolution of Cyber

We see the word “cyber” everywhere today. It’s included in all the hashtags, events names and even in hand sanitizer available for purchase at Toys ‘R Us: Cyber Clean (72% ethanol alcohol, with aloe.)With the market booming and the buzzword exploding, many of us still don’t understand what this vague word means. We’re simply toeing the line
Publish At:2021-03-08 03:38 | Read:896 | Comments:0 | Tags:Cyber Security Cyber Security Evolution cyber

Cybersecurity Challenges: Understanding the What, How and When of Change

I subscribe to a newsletter from Gary Burnison, CEO of Korn Ferry.His messages address a wide variety of career and personal issues in a thoughtful and educational manner. A recent Special Edition message was titled Exceeding Potential. It specifically addressed how opportunities present themselves and how to view and leverage them.He closed his message with
Publish At:2021-03-02 03:20 | Read:1092 | Comments:0 | Tags:Cyber Security Change _Change Management security cyber cybe

Zimperium Impresses; Named Top Cybersecurity Startup for 2021

“So, get ready to be really impressed,” Max Kurton of EM360 – a global technology platform – exclaimed as he revealed Zimperium as the number one cybersecurity startup of EM360’s Top 5 Cybersecurity Startups for 2021.  In the article – part of EM360’s Emerge5 series – Max writes, “With new technology comes new adversaries and with ne
Publish At:2021-02-01 18:32 | Read:1066 | Comments:0 | Tags:Mobile Security Mobile Threat Defense cyber security Mobile

Emotet botnet takedown – what you need to know

What’s happened?Law enforcement agencies across the globe say that they have dealt a blow against Emotet, described by Interpol as “the world’s most dangerous malware”, by taking control of its infrastructure.Police have dubbed their action against Emotet “Operation LadyBird.”What is Emotet?Emotet is an extremely advanced
Publish At:2021-01-28 11:26 | Read:744 | Comments:0 | Tags:Cyber Security Emotet malware botnet

Ghidra 101: Decoding Stack Strings

In this blog series, I will be putting the spotlight on some useful Ghidra features you might have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effectively.In thi
Publish At:2021-01-27 00:20 | Read:2105 | Comments:0 | Tags:Cyber Security IT Security and Data Protection compilers Ghi

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud