HackDig : Dig high-quality web security articles

US hospital forced to divert ambulances after cyberattack

The Idaho Falls Community Hospital fell victim to a cyberattack on Monday May 29, 2023. As a result, the hospital had to divert ambulances to other nearby hospitals and close some of its clinics.  The hospital is keeping the public updated through its website and Facebook page. “Our commitment to our patients’ well-being cont
Publish At:2023-06-01 22:03 | Read:78385 | Comments:0 | Tags:News Ransomware Idaho hospital cyberattack virus ransomware

How Morris Worm Command and Control Changed Cybersecurity

A successful cyberattack requires more than just gaining entry into a victim’s network. To truly reap the rewards, attackers must maintain a persistent presence within the system. After establishing communication with other compromised network devices, actors can stealthily extract valuable data. The key to all this is a well-developed Command and Con
Publish At:2023-05-01 11:13 | Read:157696 | Comments:0 | Tags:Incident Response Risk Management Morris Worm C2 Operation A

What’s in Your Policy: Insurance Markets and Nation State Cyberattacks

What happens when you think you have something valuable locked away in a safe place for an emergency, only to find out it is not available when you need it? Apart from expected disappointment, panic may set in. Now, think of your insurance coverage as the “valuable something” you no longer have access to because of some new guidance or exclusion
Publish At:2023-04-20 13:05 | Read:150164 | Comments:0 | Tags:Risk Management Cyberattack Cyberattacks cyber

The One Place IT Budget Cuts Can’t Touch: Cybersecurity

If IT spending is slowing, will business leaders follow a similar approach for cybersecurity budgets? Probably not. Gartner predicts that end-user spending on both security technology and services will see an annual growth rate of 11% over the next four years. And the market is anticipated to reach $267.3 billion in 2026.  Many security professionals a
Publish At:2023-03-17 10:07 | Read:341894 | Comments:0 | Tags:Security Services Cloud Services Cost of a Data Breach cyber

Breaking Down a Cyberattack, One Kill Chain Step at a Time

In today’s wildly unpredictable threat landscape, the modern enterprise should be familiar with the cyber kill chain concept. A cyber kill chain describes the various stages of a cyberattack pertaining to network security. Lockheed Martin developed the cyber kill chain framework to help organizations identify and prevent cyber intrusions. The steps in
Publish At:2023-03-14 10:43 | Read:208979 | Comments:0 | Tags:Incident Response Risk Management PAM security zero trust MF

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need
Publish At:2023-02-24 23:33 | Read:306186 | Comments:0 | Tags:Intelligence & Analytics Endpoint Identity & Access quantum

RomCom RAT Attack Analysis: Fake It to Make It

The RomCom RAT has been making the rounds — first in Ukraine as it went after military installations, and now in certain English-speaking countries such as the United Kingdom. Initially a spear-phishing campaign, the RomCom attack has evolved to include domain and download spoofing of well-known and trusted products. In this piece, we’ll break d
Publish At:2023-01-10 15:36 | Read:569805 | Comments:0 | Tags:Risk Management Threat Hunting Cyberattack Cyberattacks Cybe

Beware of What Is Lurking in the Shadows of Your IT

This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections. An example of a threat vector that can bypass security protections is “shadow IT” and it is one that organizations mus
Publish At:2022-12-21 17:25 | Read:247173 | Comments:0 | Tags:Identity & Access Incident Response Network Security Service

How Posture Management Prevents Catastrophic Cloud Breaches

We’ve all heard about catastrophic cloud breaches. But for every cyberattack reported in the news, many more may never reach the public eye. Perhaps worst of all, a large number of the offending vulnerabilities might have been avoided entirely through proper cloud configuration.   Many big cloud security catastrophes often result from what appear
Publish At:2022-12-15 11:37 | Read:271616 | Comments:0 | Tags:Cloud Security Cloud cloud breaches cloud misconfigurations

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And t
Publish At:2022-11-23 11:36 | Read:444130 | Comments:0 | Tags:CISO tech burnout incident responder Cyberattack Cyberattack

How the DNSChanger Shutdown Changed Cybersecurity

On the morning of July 9, 2012, the world braced for an “internet doomsday”: a full-scale crash of the global internet.  Except it didn’t happen. And that non-event represented the culmination of a long and successful coordinated action taken between a huge number of organizations, spearheaded by the FBI.  It was one of the most
Publish At:2022-11-14 11:35 | Read:315777 | Comments:0 | Tags:Uncategorized cyber attacks cyber crime DNSChanger Internet

Have board directors any liability for a cyberattack against their company?

Are the directors of a company hit by a cyberattack liable for negligence in failing to take steps to limit the risk. As the risk of a cyberattack grows, it is pivotal to consider whether the directors of a company hit by a ransomware attack, for example, can bear any liability for negligence in failing to take steps to limit the risk. During the past
Publish At:2022-11-14 07:50 | Read:387471 | Comments:0 | Tags:Breaking News Security cyberattack Hacking hacking news liab

How Do Data Breaches Impact Economic Instability?

Geopolitical conflict, inflation, job market pressure, rising debt — we’ve been hearing about economic headwinds for a while now. Could data breaches have anything to do with this? According to a recent IBM report, the average cost of a data breach has reached an all-time high. Like any other business liability, these costs must be absorbed some
Publish At:2022-10-13 12:09 | Read:1348184 | Comments:0 | Tags:Data Protection cost of data breach cyber attacks data breac

How Cybersecurity Policy Has Changed Since the SolarWinds Attack

Major cyberattacks since 2019 jolted the U.S. government and software industry into action. The succeeding years have seen executive orders, new funding, two summits and a newfound resolve. Because of those attacks, the federal government aims to fix the open-source software security threat altogether. But what has really come of these efforts in the last f
Publish At:2022-08-29 11:22 | Read:611549 | Comments:0 | Tags:Government Risk Management Threat Intelligence cyber attacks

How to Prevent High Risk Authentication Coercion Vulnerabilities

Most of us already know the basic principle of authentication, which, in its simplest form, helps us to identify and verify a user, process, or account. In an Active Directory environment, this is commonly done through the use of an NTLM hash. When a user wants to access a network resource, such as a file share, their password is hashed and sent over a crypt
Publish At:2022-08-28 11:25 | Read:797585 | Comments:0 | Tags:Featured Articles Vulnerability Management Authentication cy


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud