HackDig : Dig high-quality web security articles for hacker

Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks

On Tuesday morning, Oct. 24, 2017, organizations in Russia and Ukraine reported being hit with a ransomware outbreak that paralyzed their operations. Sporadic cases were also recorded in Turkey, Germany, Bulgaria and Japan, according to reports from different sources. The malware, self-titled Bad Rabbit, is a ransomware code designed to encrypt and lock file
Publish At:2017-10-26 01:10 | Read:276 | Comments:0 | Tags:Advanced Threats Malware Threat Intelligence Cyberattack Cyb

HBO hacked: Not even Daenerys dragons can protect Game of Thrones from leak

As you have probably heard already, hackers might be holding 1.5 terabytes of HBO proprietary information. No one knows what kind of information they have managed to steal, but one is for sure, the Game of Thrones script for season 7 has been reported as leaked. On Sunday afternoon reporters received an anonymous email saying: “Hi to all mankind. The greates
Publish At:2017-08-02 04:55 | Read:384 | Comments:0 | Tags:Mobile News News cyberattack Game of thrones hack HBO

Information Security in the Age of Disinformation

Depending on their specific goals and motivations, malicious external actors seek to blackmail individuals, organizations or security vendors to disrupt breach defenses or otherwise wreak havoc on IT operations. For security leaders tasked with defending against these threats, it’s hard to know who or what to believe. That challenge has only gotten wor
Publish At:2017-06-03 00:15 | Read:637 | Comments:0 | Tags:CISO Data Protection Chief Information Security Officer (CIS

When a Cyber Crisis Hits, Know Your OODA Loops

In the months since we began simulating full-scale cyberattacks for customers at our IBM X-Force Command Center in Cambridge, Massachusetts, I’ve watched a steady stream of corporate security teams confront the hair-raising experience of a simulated cyberattack. The Command Center recreates the whole crisis from start to finish, featuring a controlled,
Publish At:2017-05-30 22:30 | Read:656 | Comments:0 | Tags:CISO Incident Response X-Force Research Chief Information Se

“Eye Pyramid”, the Cyber-Espionage Malware that has Italy Reeling

This Tuesday, the Italian state police dismantled a cyber-espionage ring spearheaded by a brother and sister that sought to exert control over public institutions and administrations, professional studios, employers, and politicians. The network was able to access confidential information by installing a virus on victims’ computers, stealing information sens
Publish At:2017-01-12 01:25 | Read:733 | Comments:0 | Tags:News Cyber-espionage cyberattack eye pyramid highlighted

The website of the Hungarian Government temporarily shut by cyberattack

Officials confirmed that the Hungarian government website came under attack from outside the country. The access to many websites was blocked. The Hungarian Government announced that its computer network was targeted by a major cyber attack that temporarily blocked the access to several websites. The attacks hit the main Hungarian government website and many
Publish At:2016-04-03 10:05 | Read:1454 | Comments:0 | Tags:Breaking News Hacking cyberattack Hungarian Government Pierl

Blurred Lines: Researching the Ashley Madison Data

Put your imagination caps on folks, it’s scenario-imagining time. What if someone were to break into your home, steal your belongings and leave them somewhere with a sign in front stating “Stolen Goods”? Someone else walks by, sees the stuff and takes it all despite the Stolen Goods warning. No blurred lines here — clearly the second Mr. or
Publish At:2015-08-26 14:45 | Read:1235 | Comments:0 | Tags:Data Protection Ashley Madison Cyberattack Data Breach Infor

Compromised Contractor Credential Leads to Largest Cyberattack into the Systems of the US Government

Posted July 13, 2015   Brad HibbertThe damage from the US federal government’s Office of Personnel Management data breach is only getting worse. First disclosed last month and affecting 4.2 million US federal employees, the number of compromised records now has reached 21.5 million people, including those who received government background che
Publish At:2015-07-14 02:30 | Read:1069 | Comments:0 | Tags:Privileged Account Management cyberattack enterprise passwor

Energy Security Pros May Overestimate Their Ability To Detect a Breach, Suggests Survey

A survey recently published by Tripwire reveals that 86% of energy security professionals believe they can detect a breach in less than a week, leading some to wonder whether this confidence is misplaced.Conducted by Dimensional Research, the survey examined the views of over 400 energy executives and IT professionals in the energy, oil, gas and utility indu
Publish At:2015-06-25 22:00 | Read:1082 | Comments:0 | Tags:Featured Articles Tripwire News 2015 Data Breach Investigati

Taking Evasive Actions Against Cyberfraud

One of the interesting topics IBM teams analyze is the ways in which malware authors constantly innovate their cyberfraud techniques when it comes to evading detection either by endpoint solutions, such as antivirus tools, or research and enterprise security systems, such as sandboxes and reverse engineering techniques. Attacks involving Trojans are always i
Publish At:2015-04-21 20:10 | Read:1178 | Comments:0 | Tags:Fraud Protection Cyberattack Cybercriminals Cyberfraud Cyber

Cyber Careers: US Army Now Recruiting for ‘Exponential’ Growth

The U.S. Army is recruiting, and according to NWF Daily News, it’s not just frontline soldiers or battlefield commanders that are needed. Rather, the Army is seeking a new generation of cybersecurity experts who can help defend the nation against emerging technology threats. The Army’s Cyber Mission Force (CMF) is looking to get ahead of the curv
Publish At:2015-03-25 09:00 | Read:1040 | Comments:0 | Tags:Government and Federal Mobile Security Security Intelligence

WordPress and the GHOST Vulnerability

On Jan. 27, Qualys released a security advisory for what it termed the “GHOST” vulnerability. This was a few hours after the vulnerability was mistakenly leaked by a public relations agency on a French mailing list, possibly forcing the company’s hand to release the advisory before it had planned to. The vulnerability is a buffer overflow v
Publish At:2015-03-06 16:20 | Read:1030 | Comments:0 | Tags:Application Security Software & App Vulnerabilities Cyberatt

How to Stay Off the Data Breach List

Though cyberattacks dominated the news in 2014, with companies such as JPMorgan Chase, Target and Home Depot suffering from breaches, cyberattacks aren’t limited to only big companies. Brand recognition matters little to cybercriminals, and organizations of all sizes have been victims of a data breach. This trend will likely continue in 2015, with atta
Publish At:2015-03-04 00:30 | Read:1314 | Comments:0 | Tags:Network & Endpoint Cyberattack Cybersecurity Data Breach Hom

Cybercriminals Leverage Massively Distributed Malware in APT-Style Attacks

Since mid-2014, cybercriminals have used large distribution campaigns to infect millions of machines with the Dyre Trojan, a massively distributed malware. First identified in June 2014 as a malware that primarily steals banking credentials, Dyre has undergone many changes in a very short period. In September 2014, a variant of the Trojan was used to target
Publish At:2015-02-20 04:55 | Read:1279 | Comments:0 | Tags:Advanced Threats Banking & Financial Services CISO Industrie

A Perfect Match: Uniting Mobile Security With Your Employees’ Use of Online Dating Apps

IBM Report Details Potential Vulnerabilities That Could Compromise Mobile Security New technology has completely revolutionized the dating process. Many people are using mobile dating applications to find their “special someones.” In fact, a recent Pew Research study found that 1 in 10 Americans have used a dating site or application, and the num
Publish At:2015-02-12 07:35 | Read:2217 | Comments:0 | Tags:Application Security Mobile Security Software & App Vulnerab

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud