HackDig : Dig high-quality web security articles for hackers

Effective Threat Intelligence Through Vulnerability Analysis

Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of effort has been invested to capture, curate, taxonomize and communicate the vulnerabilities in terms of severity, impact and com
Publish At:2020-07-30 15:37 | Read:117 | Comments:0 | Tags:Vulnerability Management ENISA Report threat analysis vulner

ENISA published “Proactive detection – Measures and information sources” report

EU Agency for Cybersecurity ENISA has published a new report of the proactive detection of incidents, including measures and information sources. The EU Agency for Cybersecurity ENISA has published a new report and accompanying repository on measures and information sources that could help security experts and operators of IT and critical infrastructure t
Publish At:2020-05-31 12:03 | Read:280 | Comments:0 | Tags:Breaking News Reports Security ENISA Hacking information sec

ENISA released a Tool to map dependencies to International Standards

The European Agency for Cybersecurity ENISA has released a tool for the mapping of international security standards to interdependencies’ indicators. ENISA has released a tool for the mapping of international security standards to interdependencies’ indicators that have been introduced and demonstrated in the report Good practices on interdependencies bet
Publish At:2020-04-06 17:16 | Read:1019 | Comments:0 | Tags:Breaking News Security ENISA information security news it se

Navigating Cyber Landscape of Connected and Autonomous Cars

In recent years, various attacks have been performed to highlight security concerns about evolving smart cars. In particular, remote hacks took a lot of attention in 2015 when two security researchers hijacked the car’s infotainment system and demonstrated how to manipulate smart car functions. Such attacks elevate the risks associated with the smart car sys
Publish At:2020-03-02 00:48 | Read:732 | Comments:0 | Tags:IT Security and Data Protection cybersecurity ENISA Privacy

Assessment Frameworks for NIS Directive Compliance

According to the NIS Directive, Member States should adopt a common set of baseline security requirements to ensure a minimum level of harmonized security measures across EU and enhance the overall level of security of operators providing essential services (OES) and digital service providers (DSP).The NIS Directive sets three primary objectives:to improve t
Publish At:2020-02-09 10:21 | Read:669 | Comments:0 | Tags:Regulatory Compliance compliance dps ENISA NCSC NIS OES

ENISA Threat Landscape Report 2016, who is attacking us, and how?

ENISA has issued the annual ENISA Threat Landscape Report 2016, a document that synthesizes the emerging trends in cyber security The European Union Agency for Network and Information Security (ENISA) is an EU Agency composed of security experts that work with these states, public organizations and private groups to develop advice and recommendations on go
Publish At:2017-02-09 19:50 | Read:5171 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Data Breach Deep Web

ENISA Threat Landscape 2015, a must reading

ENISA has issued the annual ENISA Threat Landscape 2015 a document that synthesizes the emerging trends in cyber security I’m very happy to announce the publication of the annual ENISA Threat Landscape 2015 (ETL 2015), this is the fifth report issued by the European Agency. The ENISA Threat Landscape 2015 summarizes top
Publish At:2016-01-28 18:30 | Read:4001 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Reports Securi

Reading the ENISA Threat Landscape 2014 report

The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landsca
Publish At:2015-01-27 19:15 | Read:3759 | Comments:0 | Tags:Cyber Crime Hacking Security 2014 black markets cyber threat

Reading the ENISA Threat Landscape report for Internet Infrastructure

ENISA published a study on the on the threat landscape and provides a list of good practices that aim at securing an Internet infrastructure assets. ENISA has published the annual analysis on the threat landscape, the document titled Threat Landscape and Good Practice Guide for Internet Infrastructure  analyzes in details the
Publish At:2015-01-16 05:05 | Read:3480 | Comments:0 | Tags:Security cyber security cyber security strategy ENISA EU Thr

ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS)

ENISA has presented at the workshop on National Cyber Security Strategies in Brussels the Evaluation Framework on National Cyber Security Strategies (NCSS). ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS), an important work that addressed to policy experts and government officials that are in
Publish At:2014-12-02 14:15 | Read:4433 | Comments:0 | Tags:Laws and regulations Security critical infrastructure cyber

Europe Holds Biggest Ever Cyber Security Incident Response Exercise Simulating 2,000 Threats

On October 30, the European Union Agency for Network Information Security (ENISA) executed the largest ever incident response readiness exercise, with the participation of more than 200 organizations and 400 cyber security professionals from 29 European countries.The day-long simulation, known as Cyber Europe 2014, aimed to test the procedures and capabiliti
Publish At:2014-10-30 21:05 | Read:3042 | Comments:0 | Tags:Top Security Stories Cyber Europe 2014 ENISA incident respon

Announce

Share high-quality web security related articles with you:)

Tools