HackDig : Dig high-quality web security articles for hacker

Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening

Very little in life grabs our attention like a shiny new object. The gleam can be irresistible, the glitter mesmerizing. That’s how it is in cybersecurity, where the landscape is almost always dotted with alluringly novel hazards. Brand new threats, fresh twists on old threats — the shiny malicious objects just keep on coming, year in and year out. 201
Publish At:2017-11-02 13:10 | Read:5151 | Comments:0 | Tags:Threat Intelligence IBM Managed Security Services (MSS) IBM

IBM Named a Leader in Latest IDC Worldwide MarketScape

Many CISOs tell us one of their most difficult challenges is identifying, hiring and retaining top security talent with the skills, experience and passion to protect their organizations’ valuable brand against the dynamic cyberthreat landscape. It’s for this reason CISOs often turn to managed security services providers as a strategy to partner a
Publish At:2017-09-21 00:50 | Read:2701 | Comments:0 | Tags:Security Services IBM Managed Security Services (MSS) IDC Ma

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks. According to IBM Managed Security Services (MSS) data,
Publish At:2017-09-19 12:00 | Read:4382 | Comments:0 | Tags:Advanced Threats Security Services Threat Intelligence X-For

Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase

There is an increased focus on cybersecurity among governments and energy and utilities organizations worldwide, and for good reason. Attacks on critical infrastructure such as fuel, electricity and drinking water carry the potential for damage far beyond their economic impact. As demonstrated by incidents such as the notorious shutdown of several Iranian nu
Publish At:2017-09-06 20:40 | Read:3076 | Comments:0 | Tags:Advanced Threats Energy & Utility Threat Intelligence Energy

A Dream of Cognitive Security? How Watson Can Help Small and Midsized Businesses Save Money

The is the second article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. Be sure to read part 1 for the full story. Many large enterprises with significant investment in cybersecurity are excited at the prospect of cognitive security. But what abou
Publish At:2017-04-25 12:21 | Read:3421 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Security Service

The Changing Fintech Landscape in Asia-Pacific and Its Security Implications

The definition of fintech, or financial technology, has grown in leaps and bounds thanks to all the disruption it has brought. Any services, aside from mainstream banking and financial tools, that aim to improve personal or commercial finance through innovation, education, banking, investment, payment, advisory or blockchain can be classified as subsets of
Publish At:2017-03-28 07:25 | Read:4368 | Comments:0 | Tags:Banking & Financial Services Blockchain Financial Industry F

And Don’t Be Falling in Love as Security Services Experts Are Walking Away

When it comes to taking chances and not letting an opportunity pass you by, Zac Brown Band said it best in the song, “As She’s Walking Away”: And don’t be falling in love as she’s walking away When your heart won’t tell your mind to tell your mouth what it should say May have lost this battle, live to fight another day Don
Publish At:2017-03-14 11:25 | Read:2895 | Comments:0 | Tags:Risk Management IBM IBM InterConnect IBM Managed Security Se

Information Overload — Now What?

Growing up in a small town, there wasn’t much to do. One magical day, I watched as a truck pulled up to the one restaurant in town and delivered a large crate onto the loading dock. Intrigued, I rode my bike over as the employees popped the top off a crate and revealed what was inside: a new arcade game called Missile Command. Fast forward to several m
Publish At:2017-03-08 23:20 | Read:3082 | Comments:0 | Tags:Infrastructure Protection IBM Managed Security Services (MSS

IBM Named a Leader in 2016 Gartner Magic Quadrant for Managed Security Services (MSSP)

We are kicking off the new year by saying thank you to our spectacular clients all around the world that push us each year to reach for innovation in our Managed Security Services (MSS). For the third consecutive year, IBM is recognized as a Leader in the Gartner Magic Quadrant for Managed Security Services. This is especially exciting given the well-receive
Publish At:2017-02-02 02:30 | Read:4506 | Comments:0 | Tags:Risk Management Security Intelligence & Analytics Gartner Ga

Rising Attack Rates and Massive Breaches Plague Government Organizations

A government’s core role is to protect and enhance the lives of its citizens. It must deliver services to create and sustain a robust and efficient public infrastructure, ensure public safety, foster sustainable economic growth and build stronger communities. Those tasks bring many challenges, but the overriding requirement of security is common to the
Publish At:2016-12-07 14:40 | Read:4415 | Comments:0 | Tags:Government and Federal Vulns / Threats X-Force Research Fede

Best Practices for Selecting a Managed Security Services Provider for Organizations in Asia-Pacific

For organizations in the Asia-Pacific region, information security has never been more important. Cyberattacks are disrupting businesses and impacting organizations across industries. As a result, businesses of all sizes are feeling the heat. Boost Preparedness With Managed Security Services Most organizations are looking to make the most of the discrete sec
Publish At:2016-12-06 20:15 | Read:3906 | Comments:0 | Tags:Data Protection IBM Managed Security Services (MSS) IDC Mana

MSS Offerings: Looking Under the Hood

Authored by Cathy Huang, Senior Research Manager, IDC Asia-Pacific. Comparing MSS Offerings in Asia-Pacific The recent “IDC MarketScape: 2016 Asia-Pacific Managed Security Services” report evaluated 17 prominent managed security services providers (MSSPs) in the region and identified six market leaders: IBM, NTT Com, CSC, BT, Symantec and Verizon
Publish At:2016-12-01 11:20 | Read:4398 | Comments:0 | Tags:Data Protection Network & Endpoint IBM Managed Security Serv

Mirai Evolving: New Attack Reveals Use of Port 7547

When the source code for the Mirai botnet was made public in late September, a top concern was that bad actors might modify the code to increase the number of Internet of Things (IoT) devices they can compromise. It seems these fears have been realized. A few weeks ago, Reverse Engineering Blog disclosed a vulnerability in the Eir D1000 modem that could enab
Publish At:2016-12-01 11:20 | Read:4499 | Comments:0 | Tags:Threat Intelligence Vulns / Threats Advanced Threats Botnet

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

VoIP Attacks by the Numbers There are numerous protocols used in voice-over-IP (VoIP) communications. According to IBM Managed Security Services (MSS) data, the most targeted VoIP protocol is Session Initiation Protocol (SIP), which accounted for over 51 percent of the security event activity analyzed in the last 12 months. SIP is one of the most commonly
Publish At:2016-11-30 16:55 | Read:4478 | Comments:0 | Tags:Threat Intelligence Vulns / Threats X-Force Research Cisco I

Ninety-Five Percent of Webshell Attacks Written in PHP

There’s nothing inherently malicious about a webshell, which is a script that can be uploaded to a web server to enable remote administration of the machine. In the hands of an attacker, however, they are a serious cyberthreat. Advanced persistent threat (APT) groups often use webshells to breach organizations. Webshell Attacks Surging Earlier this yea
Publish At:2016-11-19 23:00 | Read:6067 | Comments:0 | Tags:Vulns / Threats Advanced Persistent Threat (APT) IBM Managed


Share high-quality web security related articles with you:)


Tag Cloud