HackDig : Dig high-quality web security articles for hackers

NSA: Top 25 vulnerabilities actively abused by Chinese hackers

The U.S. National Security Agency (NSA) warns that Chinese state-sponsored hackers exploit 25 different vulnerabilities in attacks against U.S. organizations and interests.In an advisory issued today, the NSA said that it is aware of targeted attacks by Chinese state-sponsored hackers against National Security Systems (NSS), the U.S. Defense Industrial
Publish At:2020-10-20 13:36 | Read:147 | Comments:0 | Tags:Security Government hack

UAE’s Information Assurance Regulation – How to Achieve Compliance

For years, the United Arab Emirates (UAE) has committed itself to adopting information technology (IT) and electronic communication. The UAE’s Telecommunications Regulatory Authority (TRA) noted that this policy has made the state’s government agencies and organizations more efficient as well as has improved the ability for individuals to collaborate around
Publish At:2020-10-15 00:19 | Read:116 | Comments:0 | Tags:Government Regulatory Compliance compliance National Cyber R

NERC Publishes Practice Guide for Assessing SVCHOST.EXE

One of our customers (You know who you are, thanks!) made us aware of a new practice guide titled “ERO Enterprise CMEP Practice Guide: Assessment of SVCHOST.EXE” published exactly two weeks ago today on September 15th, 2020.North American Electric Reliability Corporation (NERC) seldom releases guidance like this, so they shouldn’t go unnoticed. They’ve publi
Publish At:2020-09-30 12:20 | Read:96 | Comments:0 | Tags:Government ICS Security cybersecurity ICS security SVCHOST.E

US 2020 Presidential apps riddled with tracking and security flaws

The Vote Joe app, used by the Biden 2020 Presidential campaign to better engage with voters, was found to be leaking potentially sensitive information about voters, such as their political affiliations and past voting choices.The iOS app also didn't enforce email verification which would let anybody, including non-US citizens, download the app and have
Publish At:2020-09-17 13:27 | Read:139 | Comments:0 | Tags:Security Government security

CNN-News18 allegedly hacked to deny PayTM hack claims

A hacking group claims to have breached India's CNN-News18 news site to use it to refute claims that they hacked PayTM Mall earlier this week, BleepingComputer has learned.News18 is an English-language news channel that provides Indian and local news via the Indian Broadcasting Network and international news in a partnership with CNN.A hacker group that
Publish At:2020-09-03 17:07 | Read:197 | Comments:0 | Tags:Security Government hack

Moldovan National Pleaded Guilty to Role in Digital Crime Enterprise

A national of the Republic of Moldova pleaded guilty to his role in a digital crime enterprise that caused hundreds of millions of dollars in losses.On July 31, Valerian Chiochiu (aka “Onassis,” “Flagler,” “Socrate,” and “Eclessiastes”), 30, pleaded guilty to a charge of conspiracy under the Racketeer Influenced and Corrupt Organizations (RICO) Act before U.
Publish At:2020-08-04 07:35 | Read:336 | Comments:0 | Tags:Government Latest Security News conspiracy digital crime Inf

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:410 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

Los Angeles Man Arrested, Charged with PPP Loan Fraud

U.S. law enforcement arrested and charged a man with fraudulently obtaining loans via the Paycheck Protection Program (PPP).On July 16, Acting Assistant Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division and U.S. Attorney Nicola T. Hanna of the Central District of California announced the arrest of Andrew Marnell, 40, of Los Ange
Publish At:2020-07-17 14:53 | Read:443 | Comments:0 | Tags:Government IT Security and Data Protection arrest Fraud PPP

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overall security posture. The Cyberspace Solarium Commission tackled issues of security strategy and overall cybersecurity preparedness across both the private and public sectors in the
Publish At:2020-06-01 11:00 | Read:571 | Comments:0 | Tags:CISO Government Business Continuity Chief Information Securi

What Truly Matters for Remote Workers Using GFE and BYOD Mobile Devices

The world has changed and we all know it. Mobile operations are at the forefront of every organization and so is mobile security. We’ve all seen attacks as simple as malicious apps, SMS phishing and man-in-the-middle attacks; to the more challenging, such as elevation of privileges, exfiltration of data and command and control manipulation. What you may not
Publish At:2020-05-24 07:37 | Read:637 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD cyber se

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published
Publish At:2020-05-24 07:20 | Read:621 | Comments:0 | Tags:Government Privacy Security world backdoor Department of Jus

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

Between late March and mid-April 2020, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a phishing campaign targeting small businesses that appears to originate from the U.S. Government Small Business Administration (SBA.gov). The emails, which contain subjects and attachments related to the need for small businesses to apply for disa
Publish At:2020-05-03 08:13 | Read:907 | Comments:0 | Tags:Government Malware Threat Hunting Credentials Theft Email IB

U.S. House Oversight Committee Meeting Disrupted by Zoom-Bombers

An internal government letter revealed that Zoom-bombers had disrupted a meeting held by the U.S. House Oversight Committee.In a letter sent to Representative Carolyn B. Maloney (D-N.Y.), chairwoman of the House of Representatives’ Committee on Oversight and Reform, ranking member Jim Jordan (R-Ohio) revealed that the incident took place at the beginni
Publish At:2020-04-17 09:56 | Read:842 | Comments:0 | Tags:Government IT Security and Data Protection House Oversight C

Bad Actors Infiltrated New York’s State Government Computer Network

Officials revealed that malicious actors had succeeded in infiltrating the computer network serving New York’s state government.According to the Wall Street Journal (WSJ), officials revealed on April 13 that New York’s Office of Information Technology had discovered the security incident in late-January 2020. Its analysis unveiled that those indi
Publish At:2020-04-15 11:36 | Read:857 | Comments:0 | Tags:Government Latest Security News attacker Network New York

Governments’ Coronavirus Financial Relief Targeted by Cybercriminals

Governments’ Coronavirus Financial Relief Targeted by Cybercriminals April 13th, 2020 No Comments anti-phishing, Data Privacy, Data Protection, identity theft, Online Privacy, Uncategorized “Scammers are leveraging theCOVID-19 pandemic to steal your
Publish At:2020-04-13 13:10 | Read:1478 | Comments:0 | Tags:anti-phishing Data Privacy Data Protection identity theft On

Tools

Tag Cloud