HackDig : Dig high-quality web security articles for hackers

A week in security (December 28 – January 3)

First off we would like to wish all our readers a happy and secure 2021! Last week on Malwarebytes Labs we presented an overview of developments in the SearchDimension hijackers, we looked at the most enticing cyberattacks of 2020, and we also looked back at the strangest cybersecurity events of 2020. Other cybersecurity news: Google patched a bug
Publish At:2021-01-04 13:00 | Read:261 | Comments:0 | Tags:A week in security 2020 Apple china corellium cyberattacks c

A Review of Ransomware in 2020

As if dealing with COVID-19 were not enough, 2020 turned out to be a banner year for another troublesome strain of virus— ransomware. Malicious actors grew more sophisticated, daring and brutal. They also hit a number of high-profile targets.For those of you who didn’t keep up with all of the developments in the ransomware space, we’ve broken down some of th
Publish At:2020-12-29 06:02 | Read:306 | Comments:0 | Tags:IT Security and Data Protection Cyberattacks cybercrime malw

‘Tis the Season for Nonprofit Cybersecurity Risks to Reach New Heights

The period between Christmas and New Year’s Day has long been the time people give to charities the most, making the charities themselves attractive targets for cyber criminals. Because the events of 2020 will likely boost existing trends, nonprofit cybersecurity challenges may be greater than ever this year — even as groups find themselves with
Publish At:2020-12-26 11:53 | Read:414 | Comments:0 | Tags:Data Protection Fraud Protection holiday Cyberattacks Cyberc

3 Ways to Prepare Your Enterprise’s Data Security for a Future of Advanced Attacks

One significant negative implication of technology’s continual evolution is proportional advancement in nefarious internet activities, particularly cyber attacks. The past few years have seen a rising sophistication in cyber attacks at levels never experienced before. The worst fact is that attacks will likely only continue to get more advanced. To fig
Publish At:2020-11-18 03:20 | Read:454 | Comments:0 | Tags:IT Security and Data Protection Cyberattacks data breach res

16 hardware and software platforms hacked in minutes. A contest or business reality?

To date in 2020, the Spanish Data Protection Agency (AEPD) has reported 837 security breaches affecting personal data, which is 201 more than those reported in the same period last year. Yet one in three of these are still without a security incident response plan, which underlines how the security teams charged with this task and with providing a forensic r
Publish At:2020-11-17 10:22 | Read:379 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b cyberat

SEC’s Office of Compliance Inspection and Examinations Warns of a Sudden Increase in Credential Stuffing Hack

Recently, the Securities and Exchange Commission’s exam division issued a Risk Alert (the “Alert”) where it carried out several targeted cybersecurity investigations. The agency is now concerned with how there’s been an increase in a specific type of hack known as “credential stuffing.“This cyberattack involves using stolen credentials to log into web-based
Publish At:2020-11-16 00:37 | Read:461 | Comments:0 | Tags:Cyber Security Featured Articles credential stuffing Cyberat

A Closer Look at the Attempted Ransomware Attack on Tesla

Cybersecurity is in the news again with the disclosure that Tesla, working in conjunction with the FBI, prevented a ransomware attack from being launched at its Gigafactory in Nevada. The cybercriminals targeted Tesla through one of its employees, whom they allegedly promised to pay $1 million in order to help them infect the company’s system with malware.Wh
Publish At:2020-10-20 01:13 | Read:632 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Cyberattac

American Fortune 500 Company Hit by Ransomware Cyberattack

Universal Health Services (UHS), a Fortune 500 company, was hit by a sophisticated ransomware cyberattack. The Pennsylvania-based company that specializes in providing hospital and healthcare services was affected by a Ryuk ransomware. The ransomware operation has not been active for months but has just reappeared on the horizon by nearly toppling one of the
Publish At:2020-10-01 07:45 | Read:541 | Comments:0 | Tags:Mobile News Security cyberattacks hacking attacks healthcare

Ransomware Attacks: How to Protect your Data With Encryption

Cybercriminals are making headlines using ransomware to block organizations from accessing their own critical business data to extort ransoms. Recently, the University of California San Francisco fell victim to a ransomware attack on key academic and research data (the institution is known to be working on a cure for COVID-19) and ended up paying over $1.14
Publish At:2020-09-04 12:08 | Read:670 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Malware Mob

6 Cloud Security Threats Healthcare Companies May Face – With Solutions

For healthcare organizations that handle a lot of patient data, including very sensitive information, cloud computing is a revolution to data storage. Cloud computing in healthcare lowers data storage costs (compared to the old paper-storage era), enables easy retrieval of patient data and also improves the privacy of patient information. This has inevitably
Publish At:2020-07-15 01:07 | Read:768 | Comments:0 | Tags:Featured Articles Healthcare Cloud Cyberattacks Data Breache

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:650 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

What is Hacktivism? Campaigns That Shaped the Movement

From protests and sit-ins to doxxing and distributed denial-of-service attacks, a new kind of activism rose in the ranks. In 1996, cyber-activism gained a reputation and was given a new name: hacktivism. Consisting of breaking into a computer system for political, social, religious, or anarchistic reasons, hackers began to wage a war on information. Proven t
Publish At:2020-06-23 14:16 | Read:792 | Comments:0 | Tags:Technology cyberattacks Hackers hacking infographic

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overall security posture. The Cyberspace Solarium Commission tackled issues of security strategy and overall cybersecurity preparedness across both the private and public sectors in the
Publish At:2020-06-01 11:00 | Read:919 | Comments:0 | Tags:CISO Government Business Continuity Chief Information Securi

Stronger Together — Building Cyber Resilience

In January, the World Economic Forum (WEF) again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of working underwent a drastic change due to the global pandemic. With so many employees working remotely and many business functions now in the cloud, organizations are rethinking
Publish At:2020-06-01 07:09 | Read:1116 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Survey: Nearly Two-Thirds of Orgs Have Experienced COVID-19 Related Attacks

This new world is putting a strain on organizations’ digital security defenses. First, malicious actors are increasingly leveraging coronavirus 2019 (COVID-19) as a theme to target organizations and to prey upon the fears of their employees. Our weekly COVID-19 scam roundups have made this reality clear.Second, organizations are working to mitigate the risks
Publish At:2020-05-24 10:02 | Read:868 | Comments:0 | Tags:IT Security and Data Protection Cyberattacks Remote working

Tools

Tag Cloud