HackDig : Dig high-quality web security articles

How Security Teams Combat Disinformation and Misinformation

“A lie can travel halfway around the world while the truth is still putting on its shoes.” That popular quote is often attributed to Mark Twain. But since we’re talking about misinformation and disinformation, you’ll be unsurprised to learn Twain never said that at all. In fact, no one knows who first strung those words together, but
Publish At:2023-01-12 11:38 | Read:479121 | Comments:0 | Tags:Fraud Protection Risk Management disinformation misinformati

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses ove
Publish At:2023-01-10 23:32 | Read:680310 | Comments:0 | Tags:Mobile Security Application Security Fraud Protection Malwar

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence Index
Publish At:2022-05-09 10:09 | Read:1203482 | Comments:0 | Tags:Advanced Threats Banking & Finance Data Protection Fraud Pro

What Are the Biggest Phishing Trends Today?

According to the 2022 X-Force Threat Intelligence Index, phishing was the most common way that cyber criminals got inside an organization. Typically, they do so to launch a much larger attack such as ransomware. The Index also found that phishing was used in 41% of the attacks that X-Force remediated in 2021. That’s a 33% increase from 2021.  One
Publish At:2022-04-28 10:09 | Read:916496 | Comments:0 | Tags:Data Protection Fraud Protection Identity & Access Incident

Top Security Concerns When Accepting Crypto Payment

From Microsoft to AT&T to Home Depot, more companies are accepting cryptocurrency as a way to pay for products and services. This makes perfect sense as crypto coins are a viable revenue source. Perhaps the time is ripe for businesses to learn how to receive, process and convert crypto payments into fiat currency. Still, many questions remain. How can y
Publish At:2022-04-19 10:09 | Read:967308 | Comments:0 | Tags:Banking & Finance Data Protection Fraud Protection Risk Mana

NFT Security Risks: Old Scams and New Tricks

!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> The non-fungible token (NFT) boom has also led to some serious security incidents. For example, the number of suspicious-looking domain registrations with names of NFT stores increased nearly 300% in March 2021.   To participate in an NFT marke
Publish At:2022-04-06 10:09 | Read:635737 | Comments:0 | Tags:Cloud Security Data Protection Fraud Protection Risk Managem

2022 Banking & Finance Security Intelligence Roundup

!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> The banking and finance industries deliver more services online now than ever before due to the pandemic. As a result, banking cybersecurity became more important than ever this year. Some of the threats to big data security in recent years included rans
Publish At:2022-03-31 10:08 | Read:476830 | Comments:0 | Tags:Banking & Finance Fraud Protection Banking Banking Malware B

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogra
Publish At:2022-02-02 14:03 | Read:787961 | Comments:0 | Tags:Endpoint Fraud Protection Malware Threat Research IBM X-Forc

TrickBot Bolsters Layered Defenses to Prevent Injection Research

This post was written with contributions from IBM X-Force’s Limor Kessem and Charlotte Hammond. The cyber crime gang that operates the TrickBot Trojan, as well as other malware and ransomware attacks, has been escalating activity. As part of that escalation, malware injections have been fitted with added protection to keep researchers out and get thro
Publish At:2022-01-24 10:07 | Read:1270759 | Comments:0 | Tags:Banking & Finance Fraud Protection Security Services Threat

7 Holiday Cybersecurity Tips to Try Before The Year Ends

The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season go smoothly.    End of Year and Christmas
Publish At:2021-12-06 14:02 | Read:1083146 | Comments:0 | Tags:Data Protection Fraud Protection Identity & Access Incident

How the Rise in Cyberattacks Is Changing Consumer Behavior

If a store you visit often suffers a cyberattack, you might feel like someone went through your wallet. This kind of attack or data breach, and this kind of feeling, isn’t new. The growing frequency, cost and impact of cyberattacks are new — and consumers notice. Consumers are more aware of attacks than ever before. After all, they affect the pu
Publish At:2021-11-29 17:57 | Read:895018 | Comments:0 | Tags:Data Protection Fraud Protection Incident Response Risk Mana

BrazKing Android Malware Upgraded and Targeting Brazilian Banks

Nethanella Messer and James Kilner contributed to the technical editing of this blog. IBM Trusteer researchers continually analyze financial fraud attacks in the online realms. In recent research into mobile banking malware, we delved into the BrazKing malware’s inner workings following a sample found by MalwareHunterTeam. BrazKing is an Android banki
Publish At:2021-11-17 10:05 | Read:850011 | Comments:0 | Tags:Mobile Security Application Security Banking & Finance Fraud

Identity and Access Management: What’s Driving the Rush?

A recent Fortune Business Insights report projects that the global Identity and Access Management (IAM) market (valued at $9.53 billion in 2018) will reach $24.76 billion by the end of 2026, showing a CAGR of 13.17%. What’s behind this massive demand? In a nutshell, people don’t want their identities stolen. But the real drivers are growing regu
Publish At:2021-10-28 17:20 | Read:650533 | Comments:0 | Tags:Fraud Protection Identity & Access Risk Management Cloud Ide

How Shopping Bots Can Compromise Retail Cybersecurity

Online shopping bots are not new to the e-commerce world. Stores use bots to offer better customer service, but malicious bots can cause major harm to a business. These pose cybersecurity risks to e-commerce retailers and consumers alike. Some customers use shopping bots to execute automated tasks based on a set of instructions, such as log onto website -&g
Publish At:2021-10-28 15:28 | Read:490476 | Comments:0 | Tags:Application Security Data Protection Fraud Protection Identi

What Is Proactive Cybersecurity?

Most organizations take what you might call an active approach to cybersecurity, They’re prepared to do certain things once an attack happens. Or, they take a reactive approach, taking action after an attack is completed. A proactive cybersecurity strategy is about acting before any attack occurs; it’s a good cybersecurity posture of readiness.&
Publish At:2021-10-20 15:27 | Read:710666 | Comments:0 | Tags:Data Protection Fraud Protection Risk Management Security Se


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud