HackDig : Dig high-quality web security articles

Smart Grid Fragility, a Constant Threat for the European and American Way of Living

In today’s world, a multitude of smart devices helps us to improve our lives, as we rely more and more on technology for a comfortable and efficient lifestyle – smart appliances, smart cars, smartwatches. Life as we know it is possible thanks to all of these working together for us and with us. But how do different devices synchronize and function as an ense
Publish At:2023-03-31 08:22 | Read:35537 | Comments:0 | Tags:Cybersecurity Basics

What Is User Provisioning?

User provisioning (also known as account provisioning) is a digital Identity and Access Management (IAM) process that involves creating employee/user accounts and their profiles and giving them appropriate rights and permissions across IT infrastructure and enterprise applications and systems.In addition to the account creation and access permissions, this t
Publish At:2023-03-30 10:29 | Read:41392 | Comments:0 | Tags:Access Management Cybersecurity Basics

Command-and-Control Servers Explained. Techniques and DNS Security Risks

A command-and-control server (C&C) is a computer that threat actors use to send instructions to compromised systems. Their goal is to direct infected devices into performing further malicious activities on the host or network.Hackers can use C&C or C2 servers to create botnets and launch DDoS attacks, steal, delete, and/or encrypt data. Basically, a
Publish At:2023-03-29 12:13 | Read:50523 | Comments:0 | Tags:Cybersecurity Basics Endpoint security security

What Is Quishing: QR Code Phishing Explained

Are you aware of QR code phishing or “quishing”? This form of social engineering attack is gaining popularity among cybercriminals eager to steal your data. In this article, we will find out what quishing is, how it works, and how to protect ourselves from it. Let’s dive in and learn about this latest threat in the cybersecurity world!What Is Quishing?QR cod
Publish At:2023-03-24 13:13 | Read:74107 | Comments:0 | Tags:Cybersecurity Basics

What Is Nmap and How to Use It to Enhance Network Security

Nmap is short for Network Mapper, an open-source tool used for IP and port scanning and app detection. System and network admins use it for network inventory, managing service upgrade schedules, and monitoring service uptime. At first, it was developed as a Linux tool but is now available also for Windows and MacOS.Users can also employ Nmap on less common s
Publish At:2023-03-23 09:27 | Read:150497 | Comments:0 | Tags:Cybersecurity Basics Networking security

Deep Web vs. Dark Web: What is Each and How Do They Work

You may have heard these concepts being thrown around, but you don’t really know what they are, except that they sound ominous. You may suspect that it’s a place (or places) where malicious hackers roam. You may have also heard of the so-called ‘intellectual dark web’, but that just makes matters even more confusing.So, what is the deal with these dark web a
Publish At:2023-03-10 16:01 | Read:142677 | Comments:0 | Tags:Cybersecurity Basics dark web

Top 5 Must-Watch XDR Videos from Heimdal®

As we have seen in our previous articles, news, and webinars, in this increasingly complex threat landscape, malicious actors employ more and more sophisticated techniques to exploit traditional security parameters, safeguards, and countermeasures implemented to safeguard corporate data and infrastructure. Given the current situation, enterprises may find it
Publish At:2023-03-10 08:05 | Read:140643 | Comments:0 | Tags:All things Heimdal Cybersecurity Basics

Red Team vs. Blue Team: What Is It?

With cyberattacks seemingly increasing at a high rate, companies have to make sure their details and information are secured and safe from threat actors creeping around.Today, we will talk about a popular approach used by companies to assess their cybersecurity posture effectively and securely, and gather information on attackers, red team vs. blue team.What
Publish At:2023-03-09 15:01 | Read:119534 | Comments:0 | Tags:Cybersecurity Basics

What Is Domain Generation Algorithm? Definition and Role in Malware Attacks

Domain generation algorithms (DGA) are software that creates large numbers of domain names. This helps hackers deploy malware easier. Let`s take a closer look at what DGA is, how it works, and why it’s still popular among threat actors after all these years.Threat actors use DGA so they can swiftly change the domains they’re using to launch malwa
Publish At:2023-03-06 11:39 | Read:104751 | Comments:0 | Tags:Cybersecurity Basics Endpoint security

What Is Internet Control Message Protocol (ICMP)?

The Internet Control Message Protocol (ICMP) is a protocol built into the IP suite whose main function is to allow IP-based devices to communicate error messages and exchange information about network conditions. Network administrators mainly use ICMP for network traffic analysis and troubleshooting, but it can be exploited by threat actors too, as ICMP has
Publish At:2023-02-24 12:11 | Read:152333 | Comments:0 | Tags:Cybersecurity Basics Networking

What Are DNS Records? Types and Role in DNS Attacks Mitigation

DNS records or resource records (RR) contain various types of data about domain names and IP addresses. They are stocked in DNS databases on authoritative DNS servers.DNS records offer information about what IP address is associated with what domain, for example. When you type, let`s say, www.example.com on your mobile, the device sends further a DNS query.
Publish At:2023-02-23 08:13 | Read:134944 | Comments:0 | Tags:Cybersecurity Basics Endpoint security

What Are Deepfakes and How to Spot Them

In the age of technological advancement, it’s not just tech-savvy online bad actors that you have to watch out for – fake videos created using AI-driven software known as “deepfakes” are becoming increasingly hard to spot. In this article, we’ll look at what deepfakes are and how to spot them so you can protect yourself from mis
Publish At:2023-02-17 12:11 | Read:121610 | Comments:0 | Tags:Cybersecurity Basics business deepfakes

Data Obfuscation: What It Is and How to Use It for Your Business

Data obfuscation is an important tool for businesses in this digital age, but many are left wondering what it actually is and how to use it. In this article, we will be demystifying data obfuscation and exploring its potential benefits for your business, so that you can make the most of the technology available to you.What Is Data Obfuscation?Data obfuscatio
Publish At:2023-02-17 08:13 | Read:100644 | Comments:0 | Tags:Cybersecurity Basics

What Is Transmission Control Protocol (TCP)?

Transmission Control Protocol (TCP) is a fundamental communication protocol, used in computer networks, that does exactly what its name says: it controls how data is transmitted between two systems – the client and the server, and it makes sure this is achieved successfully.Because it has been widely used on the Internet since its inception, in the 197
Publish At:2023-02-16 08:13 | Read:131082 | Comments:0 | Tags:Cybersecurity Basics Endpoint security Networking

What Is OPSEC: Operational Security Explained

Also known as operational security or procedural security, OPSEC is a security and risk management process that prevents sensitive information from falling into the hands of malicious actors. Originating in the military, OPSEC became a popular practice in the private sector as well, helping organizations to protect customer data, address cyberespionage, and
Publish At:2023-02-15 16:09 | Read:125761 | Comments:0 | Tags:Cybersecurity Basics security


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud