HackDig : Dig high-quality web security articles for hackers

Free Microsoft Service Looks at OS Memory Snapshots to Find Malware

Microsoft on Monday unveiled Project Freta, a free service that allows users to find rootkits and other sophisticated malware in operating system memory snapshots.Freta is the name of the street in Warsaw, Poland, where renowned scientist Marie Curie was born. The project’s name is related to Marie Curie inventing a mobile x-ray device that could be taken to
Publish At:2020-07-07 10:42 | Read:59 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

Driver Vulnerabilities Facilitate Attacks on ATMs, PoS Systems

Driver vulnerabilities can facilitate attacks on ATMs, point-of-sale (PoS) systems and other devices, firmware security company Eclypsium warned on Monday.Eclypsium last year analyzed device drivers from major vendors and found that over 40 drivers made by 20 companies contained serious vulnerabilities that could be exploited to deploy persistent malware.The
Publish At:2020-06-30 01:07 | Read:181 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Vulnerabilities IoT Se

Salesforce Ventures Investment Values Tanium at $9 Billion

Tanium and Salesforce have come together in a strategic relationship to help solve one of today's most compelling and urgent problems: how does security manage a workforce that has migrated from in-house company desktops to remote personal devices. It is a problem that will not go away with the end of the COVID-19 pandemic.The new relationship involves a new
Publish At:2020-06-26 12:11 | Read:78 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Management & Strat

Microsoft Releases Defender ATP for Android in Public Preview

Microsoft this week announced the public preview availability of the Android version of its Defender Advanced Threat Protection (ATP) software and the general availability of the Linux variant.Microsoft introduced Defender ATP in Windows 10 in 2016, but has since expanded its reach to other Windows versions, as well as to macOS and Linux, and now mobile devi
Publish At:2020-06-25 01:26 | Read:130 | Comments:0 | Tags:Endpoint Security Mobile Security NEWS & INDUSTRY Virus

Safe Documents Feature in Microsoft 365 Apps Now Generally Available

Microsoft this week announced that Safe Documents, a feature meant to boost the protection of Microsoft 365 users when opening unsafe documents, is generally available.Initially introduced in November, Safe Documents brings Office ATP capabilities to the desktop and provides users with increased protection compared to Protected View, which was first announce
Publish At:2020-06-23 14:41 | Read:153 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats

Micro-Segmentation for Endpoints Shows Promising Defense Against Lateral Movement

Micro-segmentation combined with zero-trust access control between the segments is recommended as one of the best approaches to breach containment. This principle is now extended from the network infrastructure to the endpoint, whether that device is local in the office, portable, or remote at home.Segmentation does not prevent compromise, but it contains it
Publish At:2020-06-23 10:49 | Read:107 | Comments:0 | Tags:Endpoint Security Network Security NEWS & INDUSTRY

Microsoft Defender ATP Gets UEFI Scanner

Microsoft has extended the protection capabilities of Microsoft Defender Advanced Threat Protection (ATP) with the addition of a Unified Extensible Firmware Interface (UEFI) scanner.With hardware and firmware-level attacks increasing in frequency over the past several years, Microsoft has decided to expand its security solution’s capabilities to ensure it ca
Publish At:2020-06-18 14:15 | Read:148 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Adobe Acrobat DC Gets Protected Mode on Windows

Adobe this week announced that it has introduced a protected mode in Adobe Acrobat DC for Windows.The feature is available only in preview at the moment, and only for Windows users running Adobe Acrobat DC 20.009.20063.381938 or higher on their machines.Protected Mode, which was introduced in Acrobat Reader ten years ago, is designed to help keep users safe
Publish At:2020-06-18 07:17 | Read:89 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

BlackBerry Adds Cryptojacking Protection to Optics Security Product

BlackBerry announced on Wednesday that the latest release of its Optics endpoint security product now includes a feature designed to protect Intel-based PCs against cryptomining malware.Many cybercriminals try to make a profit by installing cryptocurrency mining malware on compromised systems. These cryptojacking attacks often target enterprise networks as i
Publish At:2020-06-17 11:58 | Read:134 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Malware

New Security Tech in Intel CPUs Protects Systems Against Malware Attacks

Intel on Monday unveiled a new security technology for its processors that will help protect systems against attack methods commonly used by malware.The new Control-Flow Enforcement Technology (CET), which is built into the hardware microarchitecture, will initially be available in the upcoming Tiger Lake mobile processors, but the tech giant plans on includ
Publish At:2020-06-15 13:39 | Read:125 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Ap

The Latest Mobile Security Threats and How to Prevent Them

For many of us, the last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more ubiquitous than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security
Publish At:2020-06-15 10:53 | Read:211 | Comments:0 | Tags:Mobile Security Bring-Your-Own-Device (BYOD) Data Data Breac

Chinese Hackers Target Air-Gapped Systems With Custom USB Malware

For years, a China-linked threat actor named Cycldek has been exfiltrating data from air-gapped systems using a previously unreported, custom USB malware family, Kaspersky reports.Also referred to as Goblin Panda and Conimes, the hacking group has been actively targeting governments in Southeast Asia over the past two years, with its activities separated int
Publish At:2020-06-04 13:25 | Read:242 | Comments:0 | Tags:Cyberwarfare Endpoint Security NEWS & INDUSTRY Virus &am

New Technique Improves Effectiveness of Timing Channel Attacks

Two researchers have discovered a new timing channel attack technique that remains effective even if multiple processes are running on a system.Called DABANGG (the Hindi word for fearless), the newly proposed technique improves the effectiveness of flush-based attacks such as Flush+Reload and Flush+Flush, researchers Anish Saxena and Biswabandan Panda from t
Publish At:2020-06-01 08:20 | Read:146 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vu

Ragnar Locker Ransomware Uses Virtual Machines for Evasion

The Ragnar Locker ransomware has been deploying a full virtual machine to ensure that it can evade detection, Sophos reveals.The cybercriminals behind Ragnar Locker use various exploits or target Remote Desktop Protocol (RDP) connections to compromise networks, and also steal data from targeted networks prior to deploying the ransomware, to entice victims to
Publish At:2020-05-24 07:50 | Read:136 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

Chinese Hackers Target Air-Gapped Military Networks

A threat actor believed to be operating out of China has been targeting physically isolated military networks in Taiwan and the Philippines, Trend Micro reports.Tracked as Tropic Trooper and KeyBoy, and active since at least 2011, the threat actor is known for the targeting of government, military, healthcare, transportation, and high-tech industries in Taiw
Publish At:2020-05-18 13:55 | Read:370 | Comments:0 | Tags:Cyberwarfare Endpoint Security NEWS & INDUSTRY Virus &am

Announce

Share high-quality web security related articles with you:)

Tools