HackDig : Dig high-quality web security articles for hackers

10 Database Security Best Practices You Should Know

According to Risk Based Security’s 2020 Q3 report, around 36 billion records were compromised between January and September 2020. While this result is quite staggering, it also sends a clear message of the need for effective database security measures.Database security measures are a bit different from website security practices. The former involve physical
Publish At:2021-02-25 02:26 | Read:110 | Comments:0 | Tags:Featured Articles Authentication data safety database securi

Black History Month: Diversity in Cybersecurity Is More Important than Technology

Each February, the United States, Canada, the United Kingdom and other countries observe Black History Month. It’s a month-long celebration of the generations of black people who have elevated society by the way in which they’ve lived their lives. It’s also an opportunity for us to recognize that there’s still plenty of work to do in the name of promoting di
Publish At:2021-02-24 03:02 | Read:98 | Comments:0 | Tags:Featured Articles diversity Mentor security cyber cybersecur

US charges North Koreans in relation to global cyber attacks

The United States Department of Justice has charged three North Korean computer programmers with a range of cyber attacks that made headlines around the world.The men – 31-year-old Jon Chang Hyok, Kim Il, 27, and 36-year-old Park Jin Hyok – are alleged to have been part of North Korea’s Reconnaissance General Bureau (RGB), known commonly as
Publish At:2021-02-18 14:26 | Read:99 | Comments:0 | Tags:Featured Articles cyber

Coming to Life: A Detailed Tutorial on Building Your First ATT&CK Procedure

Note: The attack procedure built in this post will not work for every macOS operating system or in every scenario. There are many factors that can block scripts from running at boot time, and you should always test against your target operating system.The MITRE ATT&CK framework is a universally accepted knowledge-base of tactics, techniques and procedure
Publish At:2021-02-18 02:44 | Read:155 | Comments:0 | Tags:Featured Articles MITRE ATT&CK

Attacker Hacked into Florida City’s Water Treatment Plant, Attempted to Poison Water Supply

An attacker hacked into a Florida city’s water treatment plan and attempted to leverage that access to poison the municipality’s water supply. According to WTSP-TV, an operator at the water treatment plan in the 15,000-person City of Oldsmar, Florida noticed someone controlling his mouse cursor on February 5 at around 08:00. The operator didn’
Publish At:2021-02-09 15:56 | Read:163 | Comments:0 | Tags:Featured Articles hack

General Tips for Children & Teens on Safer Internet Day

On February 9, 2021, the world will celebrate the 18th iteration of Safer Internet Day. The theme of this year’s event is “Together for a better internet.” It’s a reminder that all of us have a responsibility to help make the web a safer place.One of the ways we can do this is by taking the online safety of children and teens to heart. In their enthusiasm fo
Publish At:2021-02-09 08:08 | Read:255 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Privacy Sa

Social Media Best Practices for Safer Internet Day

On February 9, 2021, the world will celebrate the 18th iteration of Safer Internet Day. It’s an opportunity for everyone to recognize the importance of staying safe online. It’s also a reminder that all of us play a part in making the web a safer place.One of the ways we can observe Safer Internet Day is by helping children and teens navigate social media. Y
Publish At:2021-02-09 00:20 | Read:176 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Privacy Sa

Sloppy patches are a breeding ground for zero-day exploits, says Google

Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in their software.In a blog post, Maddie Stone of Google’s Project Zero team says that 25% of the zero-day exploits detected in 2020 are closely related to
Publish At:2021-02-04 15:02 | Read:242 | Comments:0 | Tags:Featured Articles Vulnerability Management patches vendors z

8 Top Technical Resource Providers for ICS Security Professionals

Attacks against industrial control systems (ICS) are on the rise. In its 2020 X-Force Threat Intelligence Report, for instance, IBM found that digital attacks targeting organizations’ ICS had increased by more than 2,000% between 2019 and 2018. Most of those attacks involved the exploitation of vulnerabilities affecting supervisory control and data acquisiti
Publish At:2021-02-03 07:50 | Read:211 | Comments:0 | Tags:Featured Articles ICS Security ISC Security Network OT secur

A Look at the Legal Consequence of a Cyber Attack

Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it. Otherwise, you could be at risk of lengthy legal battles that result in hefty fines. Beyond that, the cost in terms of reputational loss could be catastrophic if not ha
Publish At:2021-01-26 00:56 | Read:276 | Comments:0 | Tags:Featured Articles cyber attack data breach legal cyber

Improving Your Security Posture with the Pipeline Cybersecurity Initiative

A few years ago, I worked alongside some oil commodity traders. Environmental concerns aside, I never realized how many parts were required to get the oil out of the ground, not to mention everything else that finally resulted in the production of refined products that surround our lives. As a cybersecurity professional, I was more interested in how all
Publish At:2021-01-20 00:38 | Read:341 | Comments:0 | Tags:Featured Articles ICS Security CISA compliance Critical Infr

Cybercriminals are Bypassing Multi-factor Authentication to Access Organisation’s Cloud Services

The US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to companies to better protect their cloud-based accounts after several recent successful attacks.According to an advisory published by CISA, an increasing number of attacks have succeeded as more employees have begun to work remotely w
Publish At:2021-01-14 12:02 | Read:218 | Comments:0 | Tags:Featured Articles Cloud cyber bypassing

8 Cloud Security Best Practice Fundamentals for Microsoft Azure

In a previous blog, I discussed securing AWS management configurations by combating six common threats with a focus on using both the Center for Internet Security (CIS) Amazon Web Services Foundations benchmark policy along with general security best practices.Now I’d like to do the same thing for Microsoft Azure. I had the privilege of being involved in the
Publish At:2021-01-13 08:44 | Read:302 | Comments:0 | Tags:Cloud Featured Articles IT Security and Data Protection AWS

VERT Threat Alert: January 2021 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s January 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-922 on Wednesday, January 13th.In-The-Wild & Disclosed CVEsCVE-2021-1647A vulnerability in the Microsoft Malware Protection Engine (MMPE) is currently seeing active exploitation. Since the MMPE is
Publish At:2021-01-12 21:02 | Read:295 | Comments:0 | Tags:Featured Articles

Ransomware Gangs Scavenge for Sensitive Data by Targeting Top Executives

In their attempt to extort as much money as quickly as possible out of companies, ransomware gangs know some effective techniques to get the full attention of a firm’s management team.And one of them is to specifically target the sensitive information stored on the computers used by a company’s top executives, in the hope of finding valuable data
Publish At:2021-01-11 09:56 | Read:274 | Comments:0 | Tags:Featured Articles cyberattack cybercrime ransomware

Tools

Tag Cloud