HackDig : Dig high-quality web security articles for hackers

Hackers pumped and dumped GAS cryptocurrency for $16.8 million, alleges US DOJ

US authorities have charged two Russian men with allegedly defrauding cryptocurrency exchanges and their customers out of at least $16.8 million.The men – Danil “Cronuswar” Potekhin, 25, and 35-year-old Dmitrii Karasavidi, of Voronezh and Moscow respectively – are said to be responsible for a phishing campaign that targeted customers
Publish At:2020-09-17 08:51 | Read:74 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cryptocurr

The History of Common Vulnerabilities and Exposures (CVE)

During the late 1990s, security professionals were using information assurance tools in concert with vulnerability scanners to detect and remove vulnerabilities from the systems for which they are responsible.There’s just one problem – each security vendor has its own database with little to no crossover. Each vendor’s tool generates its own alert for detect
Publish At:2020-09-17 01:02 | Read:97 | Comments:0 | Tags:Featured Articles Vulnerability Management CVE Patch Managem

Report: No Organization’s Security Culture Has Received ‘Excellent’ Score

Security culture matters to executives, but these individuals are struggling to implement it. In a November 2019 study commissioned by KnowBe4, 94% of individuals with managerial duties or higher in security or risk management said that security culture was important for their organization’s success. Even so, Security Magazine shared that 92% of respondents
Publish At:2020-09-16 01:35 | Read:68 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyber secu

Cryptocurrency exchange Eterbase hacked, $5.4 million worth of funds stolen

European cryptocurrency exchange platform Eterbase has announced that it has suffered a security breach which saw malicious hackers access its network and steal funds worth US $5.4 million.In a message posted on Telegram, the Slovakian cryptocurrency exchange listed the six hot wallets plundered by cybercriminals for their Ether, Tezos, Bitcoin, ALGO, Ripple
Publish At:2020-09-10 08:43 | Read:123 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breach cry

VERT Threat Alert: September 2020 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s September 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-903 on Wednesday, September 9th.In-The-Wild & Disclosed CVEsThere were no in-the-wild or disclosed CVEs included in this month’s security guidance.CVE Breakdown by TagWhile historical Microsoft
Publish At:2020-09-08 23:35 | Read:168 | Comments:0 | Tags:Featured Articles VERT VERT News Vulnerability Management

Podcast Episode 9 – Cloud Misconfigurations: Simple Mistakes, Big Consequences

Tripwire’s Brent Holder and Stephen Wood discuss recent study findings that provide a snapshot of what organizations are doing (and not doing) to secure their cloud.Spotify: https://open.spotify.com/episode/5wXKv9DiQjfsZNf6heXg67Stitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://w
Publish At:2020-09-08 17:36 | Read:128 | Comments:0 | Tags:Featured Articles Podcast Automation Cloud configuration

Identifying the Most Dangerous Common Software and Hardware Weaknesses and Vulnerabilities – The CWE Top 25 (2020 Editio

So far, there has not been a perfect solution to ridding the world of software and hardware weaknesses. Keeping up-to-date with which weaknesses have are most common and impactful can be a daunting task. Thankfully, a list has been made to do just that the Common Weakness Enumeration Top 25 (CWE). The CWE Top 25 is a community-developed list of the most dang
Publish At:2020-09-08 17:36 | Read:127 | Comments:0 | Tags:Featured Articles Vulnerability Management CWE vulnerabiliti

Dashboards: An Effective Cybersecurity Tool

Data is only as good as what you are able to do with it.  Not only does the cybersecurity universe collect data, but individual enterprises also collect cybersecurity data from within their organization as well as from external sources in order to add to more context and relevance. All data needs to be analyzed in order to create actionable insights. The ins
Publish At:2020-09-03 16:25 | Read:157 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data visua

Covid-19 Exposure Logging: Key Privacy Considerations

Recently, both Apple and Google released new updates for iPhone and Android devices. One feature that was added was “Covid-19 Exposure Logging.” The feature is off (for now), and according to the text that accompanies the app, when turned on, it is set to communicate via Bluetooth to other devices.iPhone Android My initial response was that we are
Publish At:2020-09-03 16:25 | Read:167 | Comments:0 | Tags:Featured Articles Healthcare Android Apple COVID-19 crowdsou

Newly-discovered KryptoCibule malware has been stealing and mining cryptocurrency since 2018

Security researchers at Slovak security firm ESET have discovered a new family of malware that they say has been using a variety of techniques to steal cryptocurrency from unsuspecting users since at least December 2018.The malware, which has been named KryptoCibule, uses a variety of legitimate technology – including Tor and the Transmission torrent c
Publish At:2020-09-03 16:25 | Read:172 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cryptocurr

Tripwire Patch Priority Index for August 2020

Tripwire‘s August 2020 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Adobe, and Apple.Up first on the patch priority list this month are patches for Microsoft and Apple for vulnerabilities that have been integrated into various exploits. Metasploit has recently added exploits for Microsoft .NET Framework, SharePoi
Publish At:2020-09-01 01:57 | Read:205 | Comments:0 | Tags:Featured Articles VERT Adobe Apple critical vulnerability mi

ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived

According to its own website, FedRAMP serves three different of partners: federal agencies, Cloud Service Providers (CSP) and third-party assessment organizations. This article will focus on CSPs and how a good CSP can provide services that provide monetary savings for your agency.Cloud Service Providers (CSP) and FedRAMPFedRAMP’s defines Cloud Service Provi
Publish At:2020-08-26 23:30 | Read:296 | Comments:0 | Tags:Cloud Featured Articles CSP ExpertOps Federal

IoT Devices in Different Industries and How to Secure Them

Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization.The digitization in day-to-day human activities has been revolutionized by the Internet of Things (IoT). Based on Gartner’s Forecast database, we can expect that there will be approximately 14 bil
Publish At:2020-08-26 01:24 | Read:211 | Comments:0 | Tags:Featured Articles Internet of Things IoT security Security F

Supply Chain Risk Management – What You Need to Know to Build a Successful SCRM Program

There is a story from years ago about a warehouse network of computers that was separated from the main network. Those machines were running older OSes. But since they weren’t connected to the company network, didn’t hold company data, and only ran the warehouse machines, they were deemed secure.One day, the sysadmin noticed that all of those com
Publish At:2020-08-26 01:23 | Read:152 | Comments:0 | Tags:Featured Articles Risk Management Secure Supply Chain supply

How IT-OT Security Has Changed in the Wake of COVID-19

After the global outbreak of coronavirus 2019 (COVID-19), organizations quickly transitioned to remote work in order to enforce social distancing and to keep their employees safe. But this work-from-home arrangement opened up organizations to more risk as well as less redundancy and resilience. That’s especially the case for organizations with operational te
Publish At:2020-08-24 02:27 | Read:397 | Comments:0 | Tags:Featured Articles IT Security and Data Protection digital tr

Tools

Tag Cloud