HackDig : Dig high-quality web security articles for hackers

Improving Your Security Posture with the Pipeline Cybersecurity Initiative

A few years ago, I worked alongside some oil commodity traders. Environmental concerns aside, I never realized how many parts were required to get the oil out of the ground, not to mention everything else that finally resulted in the production of refined products that surround our lives. As a cybersecurity professional, I was more interested in how all
Publish At:2021-01-20 00:38 | Read:168 | Comments:0 | Tags:Featured Articles ICS Security CISA compliance Critical Infr

Cybercriminals are Bypassing Multi-factor Authentication to Access Organisation’s Cloud Services

The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to companies to better protect their cloud-based accounts after several recent successful attacks.According to an advisory published by CISA, an increasing number of attacks have succeeded as more employees have begun to work remotely w
Publish At:2021-01-14 12:02 | Read:140 | Comments:0 | Tags:Featured Articles Cloud cyber bypassing

8 Cloud Security Best Practice Fundamentals for Microsoft Azure

In a previous blog, I discussed securing AWS management configurations by combating six common threats with a focus on using both the Center for Internet Security (CIS) Amazon Web Services Foundations benchmark policy along with general security best practices.Now I’d like to do the same thing for Microsoft Azure. I had the privilege of being involved in the
Publish At:2021-01-13 08:44 | Read:194 | Comments:0 | Tags:Cloud Featured Articles IT Security and Data Protection AWS

VERT Threat Alert: January 2021 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-922 on Wednesday, January 13th.In-The-Wild & Disclosed CVEsCVE-2021-1647A vulnerability in the Microsoft Malware Protection Engine (MMPE) is currently seeing active exploitation. Since the MMPE is
Publish At:2021-01-12 21:02 | Read:180 | Comments:0 | Tags:Featured Articles

Ransomware Gangs Scavenge for Sensitive Data by Targeting Top Executives

In their attempt to extort as much money as quickly as possible out of companies, ransomware gangs know some effective techniques to get the full attention of a firm’s management team.And one of them is to specifically target the sensitive information stored on the computers used by a company’s top executives, in the hope of finding valuable data
Publish At:2021-01-11 09:56 | Read:174 | Comments:0 | Tags:Featured Articles cyberattack cybercrime ransomware

Acceso Remoto Seguro: Por que es importante y por que hay que hacerlo bien

Con la llegada de COVID-19  las organizaciones de todo el mundo fueron obligadas a hacer la transición de sus empleados a trabajar desde casa, en un momento en que la infraestructura de red de las organizaciones es más compleja que nunca. Esta complejidad no es única de los entornos de IT. De hecho, las máquinas y los procesos de producción también se e
Publish At:2020-12-30 09:20 | Read:158 | Comments:0 | Tags:Featured Articles Spanish operational technology remote acce

Hacking Christmas Gifts: Remote Control Cars

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible
Publish At:2020-12-29 09:56 | Read:339 | Comments:0 | Tags:Featured Articles hack

Continue Clean-up of Compromised SolarWinds Software

Last week, the United States Cybersecurity & Infrastructure Security Agency (CISA) advised on initial steps to take in response to the SolarWinds software that was compromised by advanced persistent threat actors. While federal agencies were under a deadline to complete certain actions, this issue will require continued clean-up and longer-term efforts t
Publish At:2020-12-21 14:44 | Read:197 | Comments:0 | Tags:Featured Articles IT Security and Data Protection configurat

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

Every website on the Internet is somewhat vulnerable to security attacks. The threats range from human errors to sophisticated attacks by coordinated cyber criminals.According to the Data Breach Investigations Report by Verizon, the primary motivation for cyber attackers is financial. Whether you run an eCommerce project or a simple small business website, t
Publish At:2020-12-21 03:02 | Read:327 | Comments:0 | Tags:Cyber Security Featured Articles threat web application atta

VERT Alert: SolarWinds Supply Chain Attack

Vulnerability DescriptionThe United States Cybersecurity & Infrastructure Security Agency (CISA) has advised that an advanced persistent threat (APT) actor was able to insert sophisticated malware into officially signed and released updates to the SolarWinds network management software [1]. The attacks have been ongoing since at least March 2020 and CISA
Publish At:2020-12-18 20:26 | Read:245 | Comments:0 | Tags:Featured Articles VERT

Could Universities’ Use of Surveillance Software Be Putting Students at Risk?

Life for university students has changed massively during the coronavirus pandemic, as it has for all of us. While some in-person lectures and seminars are still taking place, there has been a big shift to remote learning. This has, perhaps understandably, led to concerns about how well students are engaging with this way of studying.Many universities have s
Publish At:2020-12-18 00:56 | Read:272 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data priva

From a Single Pane of Glass, to Functional Dashboards to Manage Cyber Risk

For the longest time, or as far as I can remember, the holy grail of all networking platforms has been the need for a single pane of glass, that single source of all information that you would need to be most effective.So, what is a single pane of glass?   If you take it at face value, it simply means a window that consists of a single square frame
Publish At:2020-12-16 02:08 | Read:227 | Comments:0 | Tags:Featured Articles dashboard cyber

8 Key Insights from the 2020 (ISC)2 Cybersecurity Workforce Study

2020 has been a very interesting year for the global workforce, with the vast majority of organizations having to rapidly transition to a remote workforce with little to no prior notice thanks to the COVID-19 pandemic.The 2020 (ISC)2 Cybersecurity Workforce Study looks at the effect of this transition to remote work and how organizations have fared. It also
Publish At:2020-12-14 03:20 | Read:278 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyber secu

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash.(Or should that be “Good riddance”?)With earlier this week seeing the final scheduled release of Flash Player, Adobe has confirmed that it will no longer be supporting the software after December 31 2020, and will actively block Flash content from running inside Flash Player from Janua
Publish At:2020-12-10 13:32 | Read:237 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Adobe Flas

12 Essential Tips for Keeping Your Email Safe

Hey, did you get that sketchy email? You know, the one from that malicious hacker trying to fool us into clicking on some malware? Boy, these criminals are relentless. Wait, what? You clicked on it? Uh-oh.A hypothetical scenario, but one that plays out every day in organizations across the globe — a very real scenario that provides a good reason to take a de
Publish At:2020-12-10 01:50 | Read:226 | Comments:0 | Tags:Featured Articles IT Security and Data Protection email secu

Tools

Tag Cloud