HackDig : Dig high-quality web security articles for hacker

DHS and FBI warn of ongoing attacks on energy firms and critical infrastructure

The US DHS and the FBI have issued a warning that APT groups are actively targeting energy firms and critical infrastructure. The US Department of Homeland Security (DHS) and the FBI have issued a warning that APT groups are actively targeting government departments, and firms working in the energy, nuclear, water, aviation, and critical manufacturing sector
Publish At:2017-10-23 00:30 | Read:2991 | Comments:0 | Tags:APT Breaking News Cyber warfare Hacking DHS Dragonfly energy

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive purposes. Symantec has spotted a new wave of cyber attacks against firms in the energy sector powered by the notorious Dragonfly group. The Dragonfly group, also known as Energetic Bear, has been active since at least 2011
Publish At:2017-09-07 16:19 | Read:3033 | Comments:0 | Tags:APT Breaking News Hacking critical infrastructure Dragonfly

2014 年のオンラインセキュリティにおける 4 大事件

2014 年は、大規模なデータ侵害から Web の根幹に関わる脆弱性まで、さまざまなセキュリティ事案が発生しましたが、その中で重要度を判断するのは難しいことです。単に興味を引くだけの出来事もあれば、オンラインセキュリティにおける大きなトレンドを示す出来事もあります。過去の名残に過ぎない脅威もあれば、将来を指し示す脅威もあるのです。この 1 年にオンラインセキュリティの世界で発生した 4 つの重要な事件を振り返り、そこから得られた(または得るべき)教訓と、来年予想される出来事を考察します。Heartbleed 脆弱性および ShellShock(Bash Bug)脆弱性の発見今年の春、Heartbleed 脆弱性が見つかりました。Heartbleed は OpenSSL の深刻な脆弱性です
Publish At:2014-12-01 04:05 | Read:2696 | Comments:0 | Tags:Security Security Response Endpoint Protection (AntiVirus) 2

The four most important online security events of 2014

With such an array of security incidents in 2014—from large-scale data breaches to vulnerabilities in the very foundation of the web—it’s difficult to know which to prioritize. Which developments were merely interesting and which speak of larger trends in the online security space? Which threats are remnants from the past and which are the indica
Publish At:2014-11-13 17:20 | Read:2277 | Comments:0 | Tags:Security Security Response Endpoint Protection (AntiVirus) 2


Share high-quality web security related articles with you:)


Tag Cloud