HackDig : Dig high-quality web security articles for hackers

What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

The current pandemic has shown us what humanity stands for: kindness, care, sharing, giving and all the great values that we have as a global community, especially in hard times. In these times of need, there are multiple initiatives that are being driven by individuals and organizations alike asking for help — both in kind and cash. And, as one would expect
Publish At:2020-05-24 06:18 | Read:181 | Comments:0 | Tags:Network Threat Research Cyberattacks Cybercriminals Identity

Grandoreiro Malware Now Targeting Banks in Spain

During the past few months, IBM X-Force researchers have noticed a familiar malware threat that typically affects bank customers in Brazil has spread to attack banks in Spain. The rise in campaigns prompted us to look into it further. Grandoreiro, a remote-overlay banking Trojan, has migrated to Spain without significant modification, proving that attackers
Publish At:2020-04-13 10:30 | Read:420 | Comments:0 | Tags:Malware Threat Research Banking Banking Malware Banking Troj

ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

The past two years have borne witness to the increasing collaboration between organized cybercrime groups to avoid duplication of efforts and maximize profits. Although this collaboration has primarily occurred between gangs developing and distributing well-known banking Trojans, such as Emotet, TrickBot and IcedID, it does not stop there. In a new and dange
Publish At:2020-04-07 08:25 | Read:527 | Comments:0 | Tags:Advanced Threats Threat Intelligence Banking Trojan Collabor

Leverage ATT&CK for ICS to Secure Industrial Control Systems

Not too many of us have directly experienced the unavailability of a critical service or infrastructure (e.g., power outages, unavailability of hospital data, etc.), but we as a security community have seen an explosive growth of cyberattacks targeting operational technology (OT) environments recently. The IBM X-Force Threat Intelligence Index 2020 found tha
Publish At:2020-03-02 12:20 | Read:420 | Comments:0 | Tags:Energy & Utility Security Intelligence & Analytics Critical

Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

The financial malware arena became a mainstream issue a little over a decade ago with the rise of malware like the Zeus Trojan, which at the time was the first commercial banking Trojan available to the cybercrime world. We have come a long way since, and the past decade saw banking Trojans become increasingly sophisticated, specialized and exclusive, operat
Publish At:2020-02-18 09:32 | Read:539 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Botnets Cybercrim

The Case for Integrating Dark Web Intelligence Into Your Daily Operations

Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. That’s why dark web intelligence can be incredibly valuable to your security operations center (SOC). By leveraging this critical information, operators can gain a better understanding of the tactics, techniques and procedures (TTPs) emplo
Publish At:2020-02-09 10:30 | Read:547 | Comments:0 | Tags:Risk Management Security Intelligence & Analytics Artificial

Emotet Activity Rises as It Uses Coronavirus Scare to Infect Targets in Japan

IBM X-Force has identified a spam campaign targeting users in Japan that employs the Coronavirus scare as a lure to encourage people to open malicious emails. The messages contain Microsoft Office files loaded with macros that, when enabled, launch an infection routine that delivers the Emotet Trojan. In general, Emotet is very focused on infecting companies
Publish At:2020-02-09 10:30 | Read:620 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Cybercrime Cyberc

Pulse VPN patched their vulnerability, but businesses are trailing behind

In April 2019, Pulse Secure published an advisory about a vulnerability in their software. In August, cybercriminals were massively scanning for systems that were running a vulnerable version. Now it’s October, and still many organizations have not applied the patches that are available for this vulnerability. This is a trend we’ve seen repeated wi
Publish At:2019-10-18 16:50 | Read:1391 | Comments:0 | Tags:Business cybercriminals exploit exploit kits exploits patch

The Day MegaCortex Ransomware Mayhem Was Averted

Averting cyberattacks planned out by aggressive threat actors is no easy feat for any organization, and much less for incident response (IR) teams who are usually called in after the attack has caused damage. IBM X-Force Incident Response and Intelligence Services (IRIS) analysts know this firsthand. The problem with this approach is that when an attack is a
Publish At:2019-10-18 10:20 | Read:840 | Comments:0 | Tags:Incident Response Malware Security Intelligence & Analytics

To Fight Cybercriminals, Follow the Money Trail

Follow the money! That is the famous first rule for investigating white collar criminal activity. It should also be the first rule for protecting your organization from a data breach, ransomware attack or other malicious activity. A basic fact of modern cybersecurity life is that the lone hacker of yore has long since vanished, replaced by sophisticated cy
Publish At:2017-08-01 18:05 | Read:4488 | Comments:0 | Tags:Fraud Protection Network Cybercrime Cybercriminals Dark Web

Psychological Security: Helping Your Team Think Like Cybercriminals

Chance favors the prepared mind. That’s what famous chemist Louis Pasteur once said, but it’s also an important principle that applies to psychological security. Remember back in middle school when name-calling was a way we expressed our emotions? You’ll likely recall the common response: “It takes one to know one!” It Takes a
Publish At:2017-07-27 00:40 | Read:3434 | Comments:0 | Tags:CISO Fraud Protection Cybercrime Cybercriminals Penetration

Cybercrime Has Become a Commodity

Today’s cybercriminals have new options that make their malicious efforts easier than ever. Cyberattacks can be purchased in several forms, including as-a-service packages and simple downloads to be installed in rogue servers. While these may not be the most cutting-edge techniques, they can be effective in infiltrating systems that have not been suff
Publish At:2017-05-24 00:45 | Read:3645 | Comments:0 | Tags:Fraud Protection Network Advanced Threats Cybercrime Cybercr

Threat Intelligence in the Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionizing warfare. Whereas security threats were once visible and easily identifiable, today’s cyberthreats are invi
Publish At:2017-05-05 20:20 | Read:3892 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics Cyber

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month. How much money earns a cyber criminal? According to a report published by the threat intelligence firm Recorded Future crooks earn between $1,000 and $3,000 a month, but one of five earns $20,000 a month or more reaching also
Publish At:2016-12-01 12:25 | Read:4637 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking criminal undergro

Love the City You Live In? So do Cybercriminals!

Myth: There is no link between your real-life location and your digital one. The truth is that the two are very much connected. Perhaps more importantly, then, is what this means when it comes to your personal security. If the state or city in which you live is a hotbed for cybercriminal activity, your chances of being infected online increase significantly.
Publish At:2016-03-11 06:35 | Read:3770 | Comments:0 | Tags:Company Blog Cybercriminals cybersecurity hackers Infographi

Announce

Share high-quality web security related articles with you:)

Tools