HackDig : Dig high-quality web security articles for hacker

Pulse VPN patched their vulnerability, but businesses are trailing behind

In April 2019, Pulse Secure published an advisory about a vulnerability in their software. In August, cybercriminals were massively scanning for systems that were running a vulnerable version. Now it’s October, and still many organizations have not applied the patches that are available for this vulnerability. This is a trend we’ve seen repeated wi
Publish At:2019-10-18 16:50 | Read:531 | Comments:0 | Tags:Business cybercriminals exploit exploit kits exploits patch

The Day MegaCortex Ransomware Mayhem Was Averted

Averting cyberattacks planned out by aggressive threat actors is no easy feat for any organization, and much less for incident response (IR) teams who are usually called in after the attack has caused damage. IBM X-Force Incident Response and Intelligence Services (IRIS) analysts know this firsthand. The problem with this approach is that when an attack is a
Publish At:2019-10-18 10:20 | Read:157 | Comments:0 | Tags:Incident Response Malware Security Intelligence & Analytics

To Fight Cybercriminals, Follow the Money Trail

Follow the money! That is the famous first rule for investigating white collar criminal activity. It should also be the first rule for protecting your organization from a data breach, ransomware attack or other malicious activity. A basic fact of modern cybersecurity life is that the lone hacker of yore has long since vanished, replaced by sophisticated cy
Publish At:2017-08-01 18:05 | Read:3640 | Comments:0 | Tags:Fraud Protection Network Cybercrime Cybercriminals Dark Web

Psychological Security: Helping Your Team Think Like Cybercriminals

Chance favors the prepared mind. That’s what famous chemist Louis Pasteur once said, but it’s also an important principle that applies to psychological security. Remember back in middle school when name-calling was a way we expressed our emotions? You’ll likely recall the common response: “It takes one to know one!” It Takes a
Publish At:2017-07-27 00:40 | Read:2598 | Comments:0 | Tags:CISO Fraud Protection Cybercrime Cybercriminals Penetration

Cybercrime Has Become a Commodity

Today’s cybercriminals have new options that make their malicious efforts easier than ever. Cyberattacks can be purchased in several forms, including as-a-service packages and simple downloads to be installed in rogue servers. While these may not be the most cutting-edge techniques, they can be effective in infiltrating systems that have not been suff
Publish At:2017-05-24 00:45 | Read:2860 | Comments:0 | Tags:Fraud Protection Network Advanced Threats Cybercrime Cybercr

Threat Intelligence in the Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionizing warfare. Whereas security threats were once visible and easily identifiable, today’s cyberthreats are invi
Publish At:2017-05-05 20:20 | Read:3167 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics Cyber

How much money earns cybercriminals? Mostly from $1,000 to $3,000, but …

According to a report published by the threat intelligence firm Recorded Future cybercriminals earn between $1,000 and $3,000 a month. How much money earns a cyber criminal? According to a report published by the threat intelligence firm Recorded Future crooks earn between $1,000 and $3,000 a month, but one of five earns $20,000 a month or more reaching also
Publish At:2016-12-01 12:25 | Read:4015 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking criminal undergro

Love the City You Live In? So do Cybercriminals!

Myth: There is no link between your real-life location and your digital one. The truth is that the two are very much connected. Perhaps more importantly, then, is what this means when it comes to your personal security. If the state or city in which you live is a hotbed for cybercriminal activity, your chances of being infected online increase significantly.
Publish At:2016-03-11 06:35 | Read:3158 | Comments:0 | Tags:Company Blog Cybercriminals cybersecurity hackers Infographi

Blind SQL Injection: The Last Handkerchief Up the Attacker’s Sleeve

For as long as SQL injection has been around, it is still not old news — at least for attackers. Attackers will take whatever path they can to reach an exploit The simpler the path, the better. However, sometimes they need to use a little more elbow grease. That’s where blind SQL injection comes in. If an attacker were a magician, this attack would be
Publish At:2016-01-19 16:25 | Read:4119 | Comments:0 | Tags:Vulns / Threats Cybercriminals IBM Managed Security Services

Eight Crazy Hacks: The Worst and Weirdest Data Breaches of 2015

2015 was a banner year for cybercriminals. And with less than a month left before the calendar rolls over, it’s worth taking a look back at the biggest, craziest and downright strangest hacks and data breaches of the last 11 months. Eight Crazy Hacks in 2015 In no particular order, here are eight of the biggest and strangest hacks from the past year: 1
Publish At:2015-12-09 23:55 | Read:3038 | Comments:0 | Tags:Advanced Threats Ashley Madison Automobile Industry Cybercri

Economic Espionage: The Perfect Storm

Today’s CEOs, be they from large multinational enterprises or smaller shops, need to think about the effects economic espionage may have on their companies. Their own intellectual property, trade secrets and personnel are all of interest to others. In addition, data provided to and received from customers, clients and employees may prove to be the most
Publish At:2015-12-07 17:40 | Read:2871 | Comments:0 | Tags:CISO Cyber Espionage Cybercrime Cybercriminals Organized Cri

Researching the Psychology of Hackers

Being the inspiration for “CSI: Cyber” is not likely an honor many people in the security field would be happy to claim. But this is exactly the tag line that cyberpsychologist Professor Mary Aiken is often given. As the director of the CyberPsychology Research Center (CPRC) in Dublin, she has an interesting viewpoint on cybercriminals and hacker
Publish At:2015-12-02 11:05 | Read:3202 | Comments:0 | Tags:Threat Intelligence Cybercrime Cybercriminals DEF CON Human

Hacking Contests Drive Millennials to Cybersecurity

It’s no secret that the cybersecurity talent shortage is one of the biggest challenges facing our industry, with experts predicting 1.5 million open and unfilled global security positions over the next five years. Simple awareness of careers in this field is just the beginning; currently, almost two-thirds of high school students reported that the idea
Publish At:2015-11-12 21:25 | Read:2737 | Comments:0 | Tags:Security Intelligence & Analytics Cybercriminals Cybersecuri

The Myth of the Omnipotent Hacker

It’s not uncommon to see a hacker in a movie or a television show sitting in a dark basement, frantically typing as he or she simultaneously transfers money from the largest bank in the world, changes traffic lights from green to red to stop the good guys, raises the temperature on a nuclear core and turns off life support for a key character’s b
Publish At:2015-08-25 21:10 | Read:2249 | Comments:0 | Tags:IBM X-Force Cybercriminals Dark Web Hackers IBM X-Force Exch

Taking Evasive Actions Against Cyberfraud

One of the interesting topics IBM teams analyze is the ways in which malware authors constantly innovate their cyberfraud techniques when it comes to evading detection either by endpoint solutions, such as antivirus tools, or research and enterprise security systems, such as sandboxes and reverse engineering techniques. Attacks involving Trojans are always i
Publish At:2015-04-21 20:10 | Read:3283 | Comments:0 | Tags:Fraud Protection Cyberattack Cybercriminals Cyberfraud Cyber


Share high-quality web security related articles with you:)


Tag Cloud