HackDig : Dig high-quality web security articles for hackers

Magento 1.x EOL is set on June 30, 75% of installs potentially impacted

Adobe, Mastercard, Visa are warning the owners of the online store running Magento 1.x of updating their installs because it will reach EOL by June 30 Adobe, Mastercard, Visa are warning the owners of online store running Magento 1.x of updating their installs because it will reach the end-of-life (EOL) by June 30 After June 30, Adobe will no more offe
Publish At:2020-06-28 08:35 | Read:690 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Security e-commerce hackin

eBay staff charged with cyberstalking, sending fetal pig and spiders

byLisa VaasThis is a Halloween mask depicting the face of a bloody pig: IMAGE: Court documentsIt’s not pretty, but at least it doesn’t scurry. You can’t say the same for the other packages sent in a cyberstalking campaign allegedly orchestrated by eBay management and targeted at a Natick, Massachusetts couple who run an online e-commerce n
Publish At:2020-06-17 06:15 | Read:342 | Comments:0 | Tags:Law & order bloody pig mask Brian Gilbert cockroaches conspi

ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

The past two years have borne witness to the increasing collaboration between organized cybercrime groups to avoid duplication of efforts and maximize profits. Although this collaboration has primarily occurred between gangs developing and distributing well-known banking Trojans, such as Emotet, TrickBot and IcedID, it does not stop there. In a new and dange
Publish At:2020-04-07 08:25 | Read:732 | Comments:0 | Tags:Advanced Threats Threat Intelligence Banking Trojan Collabor

Breaking the Ice: A Deep Dive Into the IcedID Banking Trojan’s New Major Version Release

The IcedID banking Trojan was discovered by IBM X-Force researchers in 2017. At that time, it targeted banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites, mainly in the U.S. IcedID has since continued to evolve, and while one of its more recent versions became active in late-2019, X-Force researchers have identifi
Publish At:2020-04-01 07:12 | Read:710 | Comments:0 | Tags:Fraud Protection Malware Threat Research Banking Malware Ban

A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational context of the interaction. The definition of identity also depends on the context of the medium within which it is exchanged. In the physical world, when we talk about
Publish At:2020-03-13 07:59 | Read:985 | Comments:0 | Tags:Identity & Access Collaboration Compliance Customer Experien

The Evolution of Digital Certificates

In the early days of the internet, one of the first functional problems users faced was how to verify that entities on the other end of a connection were who they said they were. At first, the nebulous nature of online transactions inhibited e-commerce, since buyers feared that their payment information might be hijacked. This lack of trust precipitated the
Publish At:2017-07-25 11:50 | Read:4062 | Comments:0 | Tags:Fraud Protection Identity & Access Authentication Certificat

How to Protect Your E-commerce Business from Cyber Attacks

Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.Whether small, medium or large, every business is, sadly, at the mercy of hackers who will exploit every opportunity they get to breach sen
Publish At:2017-03-23 16:10 | Read:6106 | Comments:11 | Tags:Cyber Security Featured Articles cyber attack E-commerce SSL

Crooks hijack Magento Realex Payments extension to steal payment card data

Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to target Magento platform to steal credit card data. Crooks have been abusing a payment module to steal payment card data from online shops running on Magento e-commerce platform. According to experts a
Publish At:2017-03-14 12:30 | Read:3254 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime e-commerce Mage

Did Your Developer Leave a Website Backdoor?

The Dutch police recently arrested a developer for crimes he committed by writing a website backdoor into e-commerce sites he created and using credentials retained after the engagement concluded. This backdoor provided the malicious insider with sufficient access to perpetrate a number of crimes by leveraging 20,000 users’ credentials. The Crime The d
Publish At:2017-02-09 18:45 | Read:3525 | Comments:0 | Tags:Data Protection Identity & Access E-commerce Insider Threat

Experts discovered a number of flaws in the Avactis PHP Shopping Cart

A group of experts at VoidSec used a Grey Box approach to assess the security posture of some important aspects of Avactis PHP Shopping Cart. Avactis is an open source ecommerce Shopping Cart platform most used in US and UK. Security experts from VoidSec analyzed the e-commerce software discovered an impressive number of vulnerabilities. The group of experts
Publish At:2016-04-18 06:50 | Read:5187 | Comments:0 | Tags:Breaking News Hacking Avactis e-commerce vulnerability asses

Flaw in Magento exposes millions of websites at risk of takeover

A stored cross-site scripting vulnerability in Magento exposes millions of e-commerce websites at risk of takeover, update your platform as soon as possible Once again a vulnerability in the popular Magento e-commerce platform opens at risk of hijacking attacks millions of online merchants. According to the experts at Sucuri,
Publish At:2016-01-26 12:15 | Read:4378 | Comments:0 | Tags:Breaking News Hacking e-commerce Magento Pierluigi Paganini

Holiday Online Shopping a Challenge for Enterprise Security

Online Shopping Rules the Holidays ‘Tis the season for online holiday shopping. Unfortunately, cybercriminals know that this is also the best season for retail-related crimes. Holiday shopping can be frenetic, and online shopping is no exception. Consumers are making more purchases, are busier and are more distracted, which can lead to making security
Publish At:2015-12-02 11:05 | Read:3816 | Comments:0 | Tags:Fraud Protection Mobile Security Cybercrime E-commerce Enter

Another Magento Remote Code Execution Vulnerability

The security expert Ebrahim Hegazy has published an interesting post detailing his discovery of a new Magento Remote Code Execution Vulnerability. The popular hacker Ebrahim Hegazy (Aka Zigoo) has discovered a Remote Code Execution Vulnerability that affects the widely adopted application Magento. The experts was analyzing the
Publish At:2015-10-30 10:30 | Read:4364 | Comments:0 | Tags:Breaking News Hacking e-commerce Magento RCE vulnerability R

Thousands of Magento websites compromised to serve malware

Security experts have discovered that thousands of websites running the eBay’s Magento e-commerce platform have been compromised and used to deliver malware. Security experts at Sucuri have discovered a malware campaign that targeted a large number of websites the eBay Magento e-commerce platform. The same campaign was also mo
Publish At:2015-10-22 04:20 | Read:4697 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime e-comme

Magento payment card stealers are being used in the wild

The security researchers at Sucuri firm discovered a malicious code that could be used to steal payment card data from Magento platform. Security experts at Sucuri have uncovered a new method used by criminals to syphon payment card data from websites based on the Magento e-commerce Platform. Researchers explained that attacke
Publish At:2015-06-27 10:25 | Read:4036 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime e-commerce Mage

Tools

Tag Cloud