HackDig : Dig high-quality web security articles for hackers

Cloud workload security: Should you worry about it?

Due to the increasing use of the cloud, organizations find themselves dealing with hybrid environments and nebulous workloads to secure. Containerization and cloud-stored data have provided the industry with a new challenge. And while you can try to make the provider of cloud data storage responsible for the security of the data, you will have a hard time tr
Publish At:2020-07-29 15:18 | Read:66 | Comments:0 | Tags:Business application layer cloud cloud resources cloud workl

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data Protection Regulation, highlight encryption as an example of appropriate
Publish At:2020-07-08 10:58 | Read:167 | Comments:0 | Tags:Cloud Security Data Protection data encryption Compliance Da

Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information.SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites. They used those profiles and the stated interest of finding “good times” to
Publish At:2020-06-16 16:30 | Read:185 | Comments:0 | Tags:IT Security and Data Protection Latest Security News data se

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more ubiquitous than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security
Publish At:2020-06-15 10:53 | Read:276 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Data Data Breac

Managed Data Activity Monitoring (DAM) Is More Important Than Ever

The transition to a remote workforce has happened so quickly that many security teams have not had an opportunity to apply desired controls. Organizations are dealing with remote access and execution privileges that were unplanned even a couple of months ago. The use of personal devices and home workspaces has increased potential risks. Typical controls such
Publish At:2020-06-03 09:20 | Read:227 | Comments:0 | Tags:Data Protection Risk Management Security Services Compliance

Maze: the ransomware that introduced an extra twist

An extra way to create leverage against victims of ransomware has been introduced by the developers of the Maze ransomware. If the victim is not convinced that she should pay the criminals because her files are encrypted, there could be an extra method of extortion. Over time, more organizations have found ways to keep safe copies of their important files or
Publish At:2020-05-29 16:05 | Read:305 | Comments:0 | Tags:Threat spotlight data Fallout Maze pulse ransomware Spelevo

DoppelPaymer Ransomware Launches Site for Publishing Victims’ Data

The operators of DoppelPaymer ransomware launched a site for publishing the data of their victims who don’t pay the ransom.On February 25, DoppelPaymer’s handlers published a site called “Dopple leaks.” A message on the site at the time of launch revealed the attackers’ intention for doing so: leak the names and data of victims
Publish At:2020-02-25 08:13 | Read:421 | Comments:0 | Tags:IT Security and Data Protection Latest Security News data Do

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux command-line tools like grep, cut, sort and unique to make sense of log files and identify the chain of events that harmed my web server, to using simple Excel and pivot tables to do pretty much the same with data of all types. Now, we have much fancier
Publish At:2020-02-10 10:40 | Read:564 | Comments:0 | Tags:Security Intelligence & Analytics Access Management Analytic

5 Ways Your Organization Can Ensure Improved Data Security

Each year on January 28, the United States, Canada, Israel and 47 European countries observe Data Privacy Day. The purpose of Data Privacy Day is to inspire dialogue on the importance of online privacy. These discussions also seek to inspire individuals and businesses to take action in an effort to respect privacy, safeguard data and enable trust.In observan
Publish At:2020-02-09 10:22 | Read:610 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data data

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When you’re a journalist or work for the press, there may be times when you need to take extra cybersecurity precautions—more so than your Average Joe. Whether a reporter is trying to crowd-source information without revealing their story or operating in a country where freedom of the press is a pipe dream, cybersecurity plays an important role for any journ
Publish At:2019-11-11 23:20 | Read:1190 | Comments:0 | Tags:How-tos communication data eavesdropping encrypted journalis

What role does data destruction play in cybersecurity?

When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection, firewalls, network and endpoint security, employee awareness training, AI and machine-learning technology—you get the idea. What’s not often considered is which items should be taken away. Nearly
Publish At:2019-09-20 23:20 | Read:5217 | Comments:0 | Tags:Business data data breach data destruction Data privacy dega

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. T
Publish At:2019-09-20 11:20 | Read:1673 | Comments:0 | Tags:Researcher's corner amazon aws AWS buckets data hacking Inte

Cybersecurity Doesn’t Just Happen, You Have to Get a Round Tuit (We Have One For You)

It’s Monday. On the West Coast, Black Hat is over and if you traveled, you should be home. If you didn’t travel, it’s still Monday and there are things to be done. And August starts tomorrow – so you might be thinking, “Bah, let’s get through August and then I’ll refocus.” Not so fast. This is a round tuit. Y
Publish At:2017-07-31 14:15 | Read:6076 | Comments:0 | Tags:Threats bbc breaches data priorities research round tuit Sec

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

 The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
Publish At:2017-05-26 18:50 | Read:5053 | Comments:0 | Tags:Security companies data Internet Privacy

Immutable Integrity? – Blockchain Beyond the Bluster

Sometimes you could be forgiven for thinking that the incessant overuse of the word ‘disruptive’ these days could do with some, well, disrupting of its own. So much is written, presented and marketed around apparently ‘disruptive’ use of technologies like AI, IoT and of course blockchain, when much of it could perhaps be better described as foundation innova
Publish At:2017-04-03 10:15 | Read:7840 | Comments:0 | Tags:Off Topic blockchain data security

Announce

Share high-quality web security related articles with you:)

Tools