HackDig : Dig high-quality web security articles for hackers

Note to Banks: Proactively validate your DDoS mitigation

Banks around the world are in the cross fire of the hacktivist group Anonymous who launched campaign Op-Icarus (#OPIcarus), against global financial institutions. Anonymous wants to bring public attention to what they call ‘corruption’ inside the financial industry. The first victims of Op-Icarus were Bank of Greece, and Bank of Cyprus both of wh
Publish At:2016-05-09 10:35 | Read:3996 | Comments:0 | Tags:Cyber Security Assesment DDoS Security bank banks Cyber Secu

40,000 Reasons to Test Your DDoS Mitigation Posture

Any thoracic surgeon will tell you that implanting a pacemaker is never complete before its settings have been thoroughly validated. A patient is only discharged from hospital once the pacemaker’s configurations have been optimized for the patient’s comfort and physical security. Discharging a patient without validating the pacemaker’s settings is unthinkabl
Publish At:2015-11-03 19:15 | Read:4483 | Comments:0 | Tags:Cyber Security Assesment DDoS Security ddos mitigaiton ddos

DDoS Extortion – Biting the DDoS Bullet

It started with a five minute long DDoS attack which established that the cybercriminals meant business and could cause impact, this small sample attack stopped all business for five minutes. They then sent an email demanding payment of the ransom in bitcoins within 48 hours, otherwise a second and far more damaging DDoS attack would ensue and the ransom amo
Publish At:2015-08-11 02:45 | Read:4253 | Comments:0 | Tags:Cyber Security Assesment DDoS Security DDoS DDoS Analysis DD

The Cyber Security Iceberg – Which Way Is Up?

Spear-phishing seems to be everywhere these days. According to Symantec’s recently published 2014 Annual Report, five out of every six large companies (2,500+ employees) were targeted with spear-phishing attacks in 2014, a staggering 40 percent increase over the previous year. The Cyber-Security Iceberg When discussing the importance of strengthening user aw
Publish At:2015-06-08 18:05 | Read:4628 | Comments:0 | Tags:Cyber Security Assesment Phishing Uncategorized Cyber Securi

The 4 Phishing Commandments – #4 Unshare Thyself

We started this series with an introduction to how criminals have adapted their cyberattacks around the abundance of personal information available online, and continued with two posts highlighting key phishing identifiers: Email Addresses and Links. This post opens with a few more phishing related tips and wraps the series up with concrete steps you can tak
Publish At:2015-05-11 15:25 | Read:5562 | Comments:0 | Tags:Cyber Security Assesment Phishing attachments awareness Frie

The 4 Phishing Commandments – #2: Know Thy Email Address

The first post in this series explained how phishing has evolved from the early spam based campaigns into far more sophisticated and subtle attacks that manipulate the individual’s publicly available personal information. The post recommended adopting a healthy paranoia towards emails and digital communications in general. Ok, ok, we’re paranoid! But what do
Publish At:2015-04-27 21:05 | Read:4610 | Comments:0 | Tags:Cyber Security Assesment Cyber Crime domain names emails Per

DDoS Testing in German speaking countries

MazeBolt is pleased to announce the launch of our DDoS Testing module in Germany, Austria and Switzerland through our partner SQ Software. SQ Software recently exhibited at the IT-SA security expo in Nuremberg, Germany, where they received several inquiries about DDoS testing. Matthew Andriani, CEO of MazeBolt said “We have expanded our Threat Assessment Pla
Publish At:2014-11-04 21:10 | Read:4223 | Comments:0 | Tags:Cyber Security Assesment Attack simulation Cyber Security DD

“Phish & Tips” anyone?

10 tips on how to identify phishing emails Phishing is a form of Social Engineering that is used to manipulate users into surrendering sensitive data, credit card details and confidential data. Cyber criminals use Social Media and emails that are almost identical to emails coming from legitimate companies and often require filling out personal details, downl
Publish At:2014-10-25 18:10 | Read:4433 | Comments:0 | Tags:Cyber Security Assesment anti-phishing Attack simulation cli

The new age Of – Cyber Security Threat Assessment “DDoS Testing” vs “Penetration testing”

Introduction I have addressed with brevity pentesting in this article and mainly focused on “DDoS testing”. The reason being, I believe pentesting is a well known concept for security personnel and management in most organizations. “DDoS testing” is a relatively new concept for many people. I’ve attempted on a macro level to give insight into the differences
Publish At:2014-08-10 17:20 | Read:4197 | Comments:0 | Tags:Cyber Security Assesment DDoS Security DDoS Analysis DDoS AP


Tag Cloud