HackDig : Dig high-quality web security articles for hackers

Incident Response Analyst Report 2019

 Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries’ cyber-incident tactics and techniques used in the wild. In this report, we share our teams’ conclusions and analysis based on incident responses and statistics from 2019. As well as a ran
Publish At:2020-08-06 07:07 | Read:58 | Comments:0 | Tags:Featured Publications Data leaks Industrial threats Maliciou

IT threat evolution Q1 2020

Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently one of the most active and prolific APT groups. One notable feature of this campaign was that it marked the first time Lazarus had targeted macOS targets, with t
Publish At:2020-05-24 07:11 | Read:232 | Comments:0 | Tags:Featured Malware reports Apple iOS Apple MacOS APT Data leak

Corporate security prediction 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We
Publish At:2019-12-03 06:05 | Read:1107 | Comments:0 | Tags:Kaspersky Security Bulletin Cloud Computing Cyber espionage

Biometric data processing and storage system threats

Initially, digital biometric data processing systems were used primarily by government agencies and special services (police, customs, etc.). However, the rapid evolution of information technology has made biometric systems accessible for ‘civil’ use. They are increasingly becoming part of our everyday lives, augmenting and replacing traditional
Publish At:2019-12-02 13:05 | Read:1292 | Comments:0 | Tags:Featured Malware reports Biometric authentication Data leaks

IT threat evolution Q3 2019

Targeted attacks and malware campaigns Mobile espionage targeting the Middle East At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this
Publish At:2019-11-30 13:05 | Read:2143 | Comments:0 | Tags:Featured Malware reports Apple MacOS APT connected car Cyber

A week in security (November 18 – 24)

Last week on Malwarebytes Labs, we looked at stalkerware’s legal enforcement problem, announced our cooperation with other security vendors and advocacy groups to launch Coalition Against Stalkerware, published our fall 2019 review of exploit kits, looked at how Deepfake on LinkedIn makes for malign interference campaigns, rounded up our knowledge about the
Publish At:2019-11-25 09:50 | Read:871 | Comments:0 | Tags:A week in security Coalition Against Stalkerware data leaks

The cybercrime ecosystem: attacking blogs

Executive summary The Cybercrime Ecosystem is a series of articles explaining how cybercriminals operate, what drives them, what techniques they use and how we, regular Internet users, are part of that ecosystem. The articles will also cover technical details and up-to-date research on the threat landscape to provide a more realistic understanding of why thi
Publish At:2019-11-21 06:05 | Read:1396 | Comments:0 | Tags:Research code injection Data leaks Malware SQL injection Vul

IT threat evolution Q2 2019

Targeted attacks and malware campaigns More about ShadowHammer In March, we published the results of our investigation into a sophisticated supply-chain attack involving the ASUS Live Update Utility, used to deliver BIOS, UEFI and software updates to ASUS laptops and desktops. The attackers added a backdoor to the utility and then distributed it to users thr
Publish At:2019-09-19 18:20 | Read:1489 | Comments:0 | Tags:Featured Malware reports APT Cyber espionage Data leaks Fina

50 hashes per hour

How often do you turn off your computer when you go home from work? We bet you leave it on so you don’t have to wait until it boots up in the morning. It’s possible that your IT staff have trained you to lock your system for security reasons whenever you leave your workplace. But locking your system won’t save your computer from a new type
Publish At:2017-06-06 08:30 | Read:5133 | Comments:0 | Tags:Blog Research Data leaks Data Protection Linux Security Poli

Voter Data Theft Affects Almost Four Million in Hong Kong

National elections have become a global stage for hackers to display their virtuosity, bringing the question of cybersecurity to the forefront of the conversation. Since Barack Obama accused the Russians of meddling in 2016’s presidential election in favor of Donald Trump, several European countries have taken their own measures to avoid such cyberatta
Publish At:2017-04-19 01:30 | Read:3807 | Comments:0 | Tags:News cyberespionage data leaks elections

Is the hack of an email server behind the Panama Papers?

Which is the source of Panama Papers? According to Mossack the hackers breached its systems, according to the experts its email server was breached. The Panama Papers is a huge trove of strictly confidential documents from the Panamanian law firm Mossack Fonseca was leaked online during the weekend, it is largest data leaks ever. The entire archive of the f
Publish At:2016-04-05 16:35 | Read:4787 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking data breach da

Misconfigured Database Exposes Details of 191 Million US Voters

Security researcher Chris Vickery has identified a misconfigured database that contains the personal details of 191,337,174 US voters.The unprotected database was discovered on December 20, contains over 300 GB of data, and includes details such as full names, voter IDs, home addresses, email addresses, party affiliations, ethnicity, telephone numbers, and m
Publish At:2015-12-29 10:10 | Read:3472 | Comments:0 | Tags:Data Leaks

MacKeeper Exposed Details for 13 Million Users

For the past few weeks, security researcher Chris Vickery has been working on discovering insecure applications and contacting the makers of those apps to have the issues resolved.One of the applications he found to leak quite a large amount of personal user details is MacKeeper by Kromtech Alliance.MacKeeper is the equivalent of an antivirus combined with a
Publish At:2015-12-15 20:40 | Read:3949 | Comments:0 | Tags:Data Leaks

Children Toy Maker VTech Hacked, Data About Kids and Parents Stolen

VTech, a Chinese company that builds and sells electronic learning toys, has been breached by a mysterious hacker that shared the data with Vice's Motherboard.According to Vice reporter Lorenzo Franceschi-Bicchierai and Troy Hunt, owner of the Have I Been Pwned? service, the data they analyzed contained extremely personal details for over 4.8 million par
Publish At:2015-11-27 18:40 | Read:3564 | Comments:0 | Tags:Data Leaks

ISIS Retaliates Against Anonymous, Leaks Data of "To-Be-Killed" US Officials

The ISIS hacking division retaliated against Anonymous by leaking the personal details of a few hundred people working for various US military and law enforcement agencies.The data was leaked last Saturday, just hours after Anonymous had taken down the main ISIS operations forum, reports Vocativ.The hackers, known as the ISIS Islamic State Cyber Army, or the
Publish At:2015-11-24 00:15 | Read:4101 | Comments:0 | Tags:Data Leaks


Tag Cloud