HackDig : Dig high-quality web security articles

$10 million reward offered for information on foreign government-linked malicious hackers

A $10 million reward is being offered for information leading to the identification or location of malicious hackers working with North Korea to launch cyber attacks on US critical infrastructure.The offer comes from the US State Department which is understandably eager to disrupt the activities of hacking gangs linked to foreign governments who may have eng
Publish At:2022-07-28 13:00 | Read:340 | Comments:0 | Tags:Featured Articles Government hack

Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats?Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’.The key target is your data. Data is valuable, and organisations have paid at least $602 million to ransomware ga
Publish At:2022-07-28 05:04 | Read:410 | Comments:0 | Tags:Cyber Security Featured Articles IBM malware power systems p

Is any organisation risk and data breach free?

I walked into a business the other day. After a long conversation about the client’s need for cybersecurity and the implementation of the ISO27001 security standard, we talked about their risk appetite.“We don’t accept any risk. We’re risk-averse” said the CEO. But, is this achievable?Given the complexity of our modern world, with div
Publish At:2022-07-27 01:06 | Read:424 | Comments:0 | Tags:Featured Articles IT Security and Data Protection

The State of Data Security in 2022: The CISOs Perspective

In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is now spread across a wider attack surface, putting it at a heightened risk of becoming a compromised risk. The manner and location of data storage and correspondence h
Publish At:2022-07-26 01:06 | Read:394 | Comments:0 | Tags:Featured Articles IT Security and Data Protection C-Suite CI

Cybersecurity in city government, taken to new heights: An Interview with Shane McDaniel

When most people speak of any city government, they often mention words like “Bureaucratic”,“Behind the times”, and “Slow.”  This is especially true when considering cybersecurity initiatives.  However, a small town in Texas is changing that view.  Seguin, Texas, which was once the smallest Texas city to have a full-time cybersecurity employee
Publish At:2022-07-25 01:06 | Read:457 | Comments:0 | Tags:Featured Articles Government city local security cyber cyber

Black Hat USA 2022: What you need to know

Following a successful hybrid event in 2021 that saw more than 6,000 in-person, and more than 14,500 virtual attendees, Black Hat USA returns in 2022 to the Mandalay Bay Convention Centre in Las Vegas, Nevada. Now in its 25th year, this year’s event has three key components, each equally unmissable, namely these are Trainings, Briefings, and The Business Hal
Publish At:2022-07-25 01:06 | Read:377 | Comments:0 | Tags:Events Featured Articles black hat Black Hat USA

Cybersecurity Policy – time to think outside the box?

When we get into cybersecurity, one of the first things any organisation or company should do is write a cybersecurity policy, one that is owned by all. Easy words to put down on paper, but what do they mean?So, what is a cybersecurity policy? Well, it is defined in the Gartner IT Glossary as, “an organization’s statement of intent, principles and appro
Publish At:2022-07-21 01:06 | Read:297 | Comments:0 | Tags:Featured Articles Security Controls cybersecurity policy pol

More malware-infested apps found in the Google Play store

Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware.French security researcher Maxime Ingrao described last week on Twitter how he had discovered the new malware, named “Autolycos”, and how
Publish At:2022-07-20 13:00 | Read:324 | Comments:0 | Tags:Cyber Security Featured Articles Android Google App Store Go

Are your visuals making businesses more vulnerable to cybercrime?

In the world of modern business, companies must put extra effort into creating engaging visual content to stand out from the crowd. Social media marketing, for instance, was once deemed an easy way for companies to reach additional eyes but today, marketing is a lot more competitive than simply creating a post and hoping it goes viral.Entertaining short-form
Publish At:2022-07-19 01:06 | Read:410 | Comments:0 | Tags:Featured Articles IT Security and Data Protection business c

10,000 organisations targeted by phishing attack that bypasses multi-factor authentication

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences.The attackers used AiTM (Attacker-in-The-Middle) reverse-proxy sites to pose as Office 365 login pages which requested MFA codes, and then use
Publish At:2022-07-14 13:00 | Read:600 | Comments:0 | Tags:Cyber Security Featured Articles

Defense in Depth to minimize the impact of ransomware attacks

Ransomware attacks continue to plague organizations globally regardless of their size. In a press release by the NCC group that preceded the Annual Threat Monitor Report 2021 published for the year 2021, there were an estimated 2,690 ransomware attacks, a 92.7% increase from 2020s figures of 1,389. The increase of ransomware attacks builds upon the general g
Publish At:2022-07-14 01:06 | Read:572 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Defense in

The Great Cybersecurity Resignation

In 2022, the buzz phrase of the year has to be “The Great Resignation”. What is it? It’s a term coined to describe the current rise in people leaving their employer to find work elsewhere.But people have always moved on, right? Of course they have. Staff retention rates have always been a target for most HR functions. But something is different in 2022. More
Publish At:2022-07-13 01:06 | Read:585 | Comments:0 | Tags:Connecting Security to the Business Featured Articles C-Suit

Using DevSecOps for Efficient IT Security

DevSecOps is the key to achieving effective IT security in software development. By taking a proactive approach to security and building it into the process from the start, DevSecOps ensures improved application security.It also allows organizations to rapidly develop application security with fewer bottlenecks and setbacks. Some critical aspects of the DevS
Publish At:2022-07-11 01:06 | Read:373 | Comments:0 | Tags:DevSecOps Featured Articles application security IT Security

Defending Aircraft Networks Against Cybersecurity Breaches

The aviation industry is both vast and complex. More than 45,000 flights and 2.9 million passengers travel through U.S. airspace every day, requiring high-tech tools and extensive communications networks. All of that data and complexity makes the sector a prime target for cybercriminals. Worryingly, only 49% of non-governmental organizations have fully adopt
Publish At:2022-07-11 01:06 | Read:413 | Comments:0 | Tags:Featured Articles ICS Security aircraft Aviation Critical In

Lockdown Mode: Apple to protect users from targeted spyware attacks

Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies.“Lockdown Mode” is scheduled to arrive later this year with the release of Apple iOS 16 and macOS Ventura. It’s an optional feature for users who believe their computers and smartphones
Publish At:2022-07-07 13:00 | Read:464 | Comments:0 | Tags:Cyber Security Featured Articles Apple Authentication iPhone


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud