HackDig : Dig high-quality web security articles

How the Saitama backdoor uses DNS tunnelling

Thanks to the Malwarebytes Threat Intelligence Team for the information they provided for this article. Understandably, a lot of cybersecurity research and commentary focuses on the act of breaking into computers undetected. But threat actors are often just as concerned with the act of breaking out of computers undetected too. Malware with the intent
Publish At:2022-05-25 09:01 | Read:838 | Comments:0 | Tags:Explained Threat Intelligence DNS tunnelling malware Saitama

Why identity management matters

p>Today is Identity Management Day, which aims to inform the public about the dangers of casually or improperly managing and securing digital identities. The day was started in 2021 and is hosted by the Identity Defined Security Alliance (IDSA) and National Cybersecurity Alliance. Digital identity A digital identity doesn’t have to mean a person
Publish At:2022-04-12 08:52 | Read:1634 | Comments:0 | Tags:Explained Identity Management Day IMD 2022

Blunting RDP brute-force attacks with rate limiting

Thanks to the Malwarebytes Threat Intelligence Team for the information they provided for this article. Not long ago, guessing a Windows Remote Desktop Protocol (RDP) password successfully was widely regarded as ransomware operators’ number one choice for breaching a target. It attracted a lot of press coverage three or four years ago, and interest
Publish At:2022-03-11 21:03 | Read:1547 | Comments:0 | Tags:Explained Threat Intelligence brute force attacks brute forc

What is IP sniffing?

IP sniffers, also known as packet sniffers, network analyzers, or protocol analyzers, are tools which play an essential role in the monitoring of networks, and in troubleshooting network-related issues. In essence, IP sniffing is monitoring traffic over a TCP/IP network. IP sniffers intercept the traffic flowing in a digital network and log the data, whi
Publish At:2021-12-30 16:41 | Read:1534 | Comments:0 | Tags:Explained active sniffing Ip sniffing packet sniffers passiv

What is a search engine and why does anyone care which one you use?

An attempt at a simple definition: a search engine is a software system that allows users to find content on the Internet based on their input. The introduction of the major search engines brought about huge changes in the way we use the Internet. There is a wealth of knowledge available for those that know where to look. One search engine has become such
Publish At:2021-12-09 12:45 | Read:2868 | Comments:0 | Tags:Explained crawler default search engine directory Google pri

Is your web browser vulnerable to data theft? XS-Leak explained

In recent news, IT security researchers from Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences have disclosed 14 new cross-site leak (also known as XSLeak or XS-Leak) attacks that can affects modern browsers, such as Google Chrome, Microsoft Edge, Mozilla Firefox, and Apple’s Safari. Although the news and press release re
Publish At:2021-12-07 21:01 | Read:2298 | Comments:0 | Tags:Explained Niederrhein University of Applied Sciences Ruhr-Un

Capcom Arcade Stadium’s record player numbers blamed on card mining

Some of my favourite retro video games are making waves on Steam, but not in the way you might think. Classics such as Strider, Ghosts n’ Goblins, and more are all available as content for Capcom Arcade Stadium. This is an emulator which lets you play 31 arcade games from the 80s/90s. The games themselves are paid downloadable content, but the main emulator
Publish At:2021-12-01 17:27 | Read:1460 | Comments:0 | Tags:Explained bots botting capcom arcade stadium cards mining st

What is facial recognition?

Facebook recently announced it would give up on its facial recognition system. Facebook, or Meta, was using software to automatically identify people in images posted to its social network. Since facial recognition has become an increasingly toxic concept in many circles and Facebook was having enough to deal with as it is, it shut the “feature“ down.  But t
Publish At:2021-11-24 12:44 | Read:1504 | Comments:0 | Tags:Explained ACLU cctv database digital image EFF facebook face

Evasive maneuvers: HTML smuggling explained

Microsoft Threat Intelligence Center (MSTIC) last week disclosed “a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features” that it calls HTML smuggling. HTML smuggling has been used in targeted, spear-phishing email campaigns that deliver banking Trojans (such as Mekotio), remote access Trojans (RATs) like Async
Publish At:2021-11-15 12:44 | Read:3149 | Comments:0 | Tags:Explained banking malware banking Trojan espionage GoldMax H

What is fileless malware?

Unlike traditional malware, which relies on a file being written to a disk, fileless malware is intended to be memory resident only, ideally leaving no trace after its execution. The malicious payload exists in the computer’s memory, which means nothing is ever written directly to the hard drive. For an attacker, fileless malware has two major advantages:
Publish At:2021-10-28 10:15 | Read:1146 | Comments:0 | Tags:Explained attack surface CactusTorch credentials dropper exf

What is an .exe file? Is it the same as an executable?

You may often see .exe files but you may not know what they are. Is it the same as an executable file? The short answer is no. So what’s the difference? What is an .exe file? Exe in this context is a file extension denoting an executable file for Microsoft Windows. Windows file names have two parts. The file’s name, followed by a period fol
Publish At:2021-10-15 10:14 | Read:3828 | Comments:0 | Tags:Explained assembly exe file executable extension ida pro mac

What is the Dark Web? The Dark Web explained

You may have seen the Dark Web referenced in popular TV shows and have gotten the wrong idea, or if you already knew about it, you may have snorted in derision. The Dark Web is also sometimes called the Deep Web, when in fact the Dark Web is only a part of the Deep Web. Terminology Surface Web is what we would call the regular World Wide Web that is in
Publish At:2021-09-17 04:05 | Read:1591 | Comments:0 | Tags:Explained browser Dark Web deep web leak sites stolen data t

What are SSL certificates?

Secure Sockets Layer (SSL) certificates are what cause your browser to display a padlock icon, indicating that your connection to a websites is secure. Although the padlock may soon be hidden from view, certificates aren’t going anywhere. Let’s start with some definitions and explain some of the terminology. On a strictly technical level, S
Publish At:2021-09-15 15:15 | Read:1560 | Comments:0 | Tags:Explained encryption http HTTPS padlock SSL ssl certificate

macOS 11’s hidden security improvements

A deep dive into macOS 11’s internals reveals some security surprises that deserve to be more widely known. Contents IntroductionDisclaimersmacOS 11’s better known security improvementsSecret messages revealed?CPU security mitigation APIsThe NO_SMT mitigationThe TECS mitigationWho benefits from NO_SMT and TECS?Endpoint Security API improve
Publish At:2021-08-18 09:16 | Read:3219 | Comments:0 | Tags:Explained Mac Big Sur macOS macOS 11 security

How to troubleshoot hardware problems that look like malware problems

Sometimes it’s hard to figure out what exactly is going wrong with your computer. What do you do if you’ve run all the scans, checked all the files, and everything says the PC is malware free? Here’s a list of common problems that resemble cybersecurity issues, but could be caused by something hardware-related instead. My computer is overheating Some t
Publish At:2021-08-16 09:57 | Read:2189 | Comments:0 | Tags:Explained blue screen of death bsod CPU dust fans GPU hardwa


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud