HackDig : Dig high-quality web security articles for hackers

Moldovan National Pleaded Guilty to Role in Digital Crime Enterprise

A national of the Republic of Moldova pleaded guilty to his role in a digital crime enterprise that caused hundreds of millions of dollars in losses.On July 31, Valerian Chiochiu (aka “Onassis,” “Flagler,” “Socrate,” and “Eclessiastes”), 30, pleaded guilty to a charge of conspiracy under the Racketeer Influenced and Corrupt Organizations (RICO) Act before U.
Publish At:2020-08-04 07:35 | Read:92 | Comments:0 | Tags:Government Latest Security News conspiracy digital crime Inf

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:76 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

Los Angeles Man Arrested, Charged with PPP Loan Fraud

U.S. law enforcement arrested and charged a man with fraudulently obtaining loans via the Paycheck Protection Program (PPP).On July 16, Acting Assistant Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division and U.S. Attorney Nicola T. Hanna of the Central District of California announced the arrest of Andrew Marnell, 40, of Los Ange
Publish At:2020-07-17 14:53 | Read:192 | Comments:0 | Tags:Government IT Security and Data Protection arrest Fraud PPP

What Enterprises Can Expect Following the Cyberspace Solarium Commission Report

In March 2020, the U.S. Cyberspace Solarium Commission released its report detailing numerous recommendations for how the nation can strengthen its online infrastructure and overall security posture. The Cyberspace Solarium Commission tackled issues of security strategy and overall cybersecurity preparedness across both the private and public sectors in the
Publish At:2020-06-01 11:00 | Read:307 | Comments:0 | Tags:CISO Government Business Continuity Chief Information Securi

What Truly Matters for Remote Workers Using GFE and BYOD Mobile Devices

The world has changed and we all know it. Mobile operations are at the forefront of every organization and so is mobile security. We’ve all seen attacks as simple as malicious apps, SMS phishing and man-in-the-middle attacks; to the more challenging, such as elevation of privileges, exfiltration of data and command and control manipulation. What you may not
Publish At:2020-05-24 07:37 | Read:304 | Comments:0 | Tags:Mobile Security advanced mobile threat defense BYOD cyber se

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published
Publish At:2020-05-24 07:20 | Read:351 | Comments:0 | Tags:Government Privacy Security world backdoor Department of Jus

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

Between late March and mid-April 2020, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a phishing campaign targeting small businesses that appears to originate from the U.S. Government Small Business Administration (SBA.gov). The emails, which contain subjects and attachments related to the need for small businesses to apply for disa
Publish At:2020-05-03 08:13 | Read:597 | Comments:0 | Tags:Government Malware Threat Hunting Credentials Theft Email IB

U.S. House Oversight Committee Meeting Disrupted by Zoom-Bombers

An internal government letter revealed that Zoom-bombers had disrupted a meeting held by the U.S. House Oversight Committee.In a letter sent to Representative Carolyn B. Maloney (D-N.Y.), chairwoman of the House of Representatives’ Committee on Oversight and Reform, ranking member Jim Jordan (R-Ohio) revealed that the incident took place at the beginni
Publish At:2020-04-17 09:56 | Read:585 | Comments:0 | Tags:Government IT Security and Data Protection House Oversight C

Bad Actors Infiltrated New York’s State Government Computer Network

Officials revealed that malicious actors had succeeded in infiltrating the computer network serving New York’s state government.According to the Wall Street Journal (WSJ), officials revealed on April 13 that New York’s Office of Information Technology had discovered the security incident in late-January 2020. Its analysis unveiled that those indi
Publish At:2020-04-15 11:36 | Read:568 | Comments:0 | Tags:Government Latest Security News attacker Network New York

Governments’ Coronavirus Financial Relief Targeted by Cybercriminals

Governments’ Coronavirus Financial Relief Targeted by Cybercriminals April 13th, 2020 No Comments anti-phishing, Data Privacy, Data Protection, identity theft, Online Privacy, Uncategorized “Scammers are leveraging theCOVID-19 pandemic to steal your
Publish At:2020-04-13 13:10 | Read:1121 | Comments:0 | Tags:anti-phishing Data Privacy Data Protection identity theft On

GDPR: An impact around the world

A little more than one month after the European Union enacted the General Data Protection Regulation (GDPR) to extend new data privacy rights to its people, the governor of California signed a separate, sweeping data protection law that borrowed several ideas from GDPR, sparking a torch in a legislative data privacy trend that has now spanned at least 10 cou
Publish At:2020-04-01 17:18 | Read:579 | Comments:0 | Tags:Government Malwarebytes news Privacy Security world Argentin

Now Is the Time to Get up to Speed with CMMC and SP 800-171 Rev 2

At the beginning of March 2020, Fifth Domain reported that Colorado-based aerospace, automotive and industrial parts manufacturer Visser Precision LLC had suffered a DoppelPaymer ransomware infection. Those behind this attack ultimately published information stolen from some of Visser’s customers. Those organizations included defense contractors Lockheed Mar
Publish At:2020-03-30 01:56 | Read:829 | Comments:0 | Tags:Government NIST 800-171 ransomware Secure Supply Chain secur

Four Important Steps to Secure the United States 2020 Election

It’s an unfortunate reality that cyber attacks on the U.S. 2020 election are likely to happen. However, while this is a potent threat to democracy, an even greater threat is to not take the necessary actions to prevent these attacks until it is too late.There are many different types of cyberattacks that the U.S. 2020 election could face.Attacks on electroni
Publish At:2020-03-10 02:17 | Read:691 | Comments:0 | Tags:Government IT Security and Data Protection cyberattack elect

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.” It’s the first I’ve heard about an objective this bold, and it comes from a state that gets little media exposure: North Dakota. The small Great Plains state has establishe
Publish At:2020-02-25 08:22 | Read:1314 | Comments:0 | Tags:Government Artificial Intelligence (AI) Cybersecurity Jobs C

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

2019 was a tough year for the overall cybersecurity of state and local governments and municipal institutions. If you follow security news, there were times when not a week would go by without word of how the latest municipal cyberattacks impeded or even halted day-to-day operations. This stream of recent hacking incidents targeting government and municipal
Publish At:2020-02-21 13:22 | Read:697 | Comments:0 | Tags:Data Protection Government Cyberattacks Data Breach Healthca

Tools

Tag Cloud