HackDig : Dig high-quality web security articles for hacker

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

Britain and the United governments blame Russia for being behind a destructive cyber attack that hit Georgia during 2019. The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that hit Georgia during 2019. In October 2019, a wave of cyber attacks hit 2,000 websites in Georgia,
Publish At:2020-02-20 17:00 | Read:147 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence APT28 Cyber

US CISA warns of Ransomware attacks impacting pipeline operations

The Cybersecurity and Infrastructure Security Agency (CISA) is warning critical U.S. infrastructure operators of a recent ransomware attack that affected a natural gas compression facility. The Cybersecurity and Infrastructure Security Agency (CISA) issued an alert across critical U.S. infrastructure sectors about a recent infection at a natural gas comp
Publish At:2020-02-19 02:10 | Read:137 | Comments:0 | Tags:Breaking News Hacking Malware CISA DHS information security

Five years later, Heartbleed vulnerability still unpatched

The Heartbleed vulnerability was introduced into the OpenSSL crypto library in 2012. It was discovered and fixed in 2014, yet today—five years later—there are still unpatched systems.  This article will provide IT teams with the necessary information to decide whether or not to apply the Heartbleed vulnerability fix. However, we caution: The latter c
Publish At:2019-09-20 11:20 | Read:814 | Comments:0 | Tags:Exploits and vulnerabilities cryptography EKs exploit kits e

10 Must-Read Books for Information Security Professionals

There are many ways for IT professionals to broaden their knowledge of information security. Attending infosec conferences, for instance, provides personnel with an opportunity to complete in-person trainings and network with like-minded individuals. Outside of industry events, analysts can pick up a book that explores a specific topic of information securit
Publish At:2017-03-16 18:05 | Read:5102 | Comments:0 | Tags:Off Topic books Information Security IT

4 Best Practices for Improving Your Organization’s Supply Chain Security

Digital attackers have many different strategies for infiltrating a target organization. That even goes for companies with robust perimeter defenses. Bad actors simply need to find a soft target they can exploit. Oftentimes, they find what they’re looking for along a target’s supply chain.We can best understand the supply chain as a network of pe
Publish At:2017-03-15 05:05 | Read:2993 | Comments:0 | Tags:Featured Articles IT Security and Data Protection IT supply

More than 90% of IT Pros Expect More Attacks, Risk, and Vulnerability with IIoT in 2017

The Internet of Things (IoT) embodies great promise and risk. On the one hand, ordinary users view IoT as a means of streamlining their activities across billions of “smart” devices. They hope such connectivity will ultimately translate into better and easier lives. On the other hand, IoT devices aren’t always designed with security in mind
Publish At:2017-03-13 16:15 | Read:3680 | Comments:0 | Tags:Featured Articles ICS Security IIoT IT OT Vulnerability

International Women’s Day: 8 empowered woman in the computing world

8 empowered woman in the computing world to celebrate International Women’s Day Often seen as a male-dominated industry, women have played an important part in driving developments in the computer industry. As we celebrate International Women’s Day, these eight women have blazed a trail in IT, setting an example to us all. Ada Lovelace Despite being th
Publish At:2017-03-07 21:20 | Read:3069 | Comments:0 | Tags:Mobile Security News cybersecurity Hackers It

68% of Oil and Gas Organizations Have Suffered a Digital Attack, Reveals Report

A new report reveals that 68 percent of oil and gas organizations have experienced at least one digital attack.In the Siemens-sponsored The State of Cybersecurity in the Oil & Gas Industry: United States (PDF), Ponemeon Institute surveyed 377 individuals based in the United States who are responsible for overseeing digital risk to their organization̵
Publish At:2017-02-27 10:30 | Read:3881 | Comments:0 | Tags:Latest Security News ics IT OT

4 Tips for a Successful OT & IT Security Marriage

Securing critical infrastructure is becoming a priority for the public and private sectors. Cyber professionals everywhere are rejoicing about the increasing investments in protecting the networks and systems that keep us safe at night. The Oval Office has even signaled its intentions to make security a priority.We welcome the new administration’s desire for
Publish At:2017-02-15 03:15 | Read:5193 | Comments:0 | Tags:Featured Articles ICS Security IT OT security

Integrating IT and OT: Design Challenges in Critical Infrastructure Security

Will you be attending the 2017 RSA conference this month? Do you like information technology (IT)? Do you like operational technology (OT)? Do you like critical infrastructure and security? If you answered yes to any of these questions, then I’d love to meet you at my Learning Lab session at RSA 2017 where I’ll be facilitating discussions about the design ch
Publish At:2017-02-07 10:45 | Read:3502 | Comments:0 | Tags:Off Topic cybersecurity IT RSA 2017

Do You Buy, Build, or Partner for Cyber Security Capability?

“Do you buy, build, or partner for cyber security capability” This is a question a lot of MSPs and IT providers are looking a right now. It’s no secret that according to the CompTIA data (see below chart), the Cyber Security discussion with businesses will be a hot topic worldwide.Another interesting number from CompTIA is that 79% of businesses
Publish At:2016-12-02 05:00 | Read:4043 | Comments:0 | Tags:Cyber Security Featured Articles CompTIA IT MSP

Women in Information Security: Jess Dodson

Women in information security are a fascinating group of people. I should know, being one myself. But being female in a quickly growing male-dominated industry poses its own challenges. And those of us who pursue security and IT in spite of gender stereotypes have unique strengths and insight.I first interviewed Tiberius Hefflin, a Scottish security analyst
Publish At:2016-11-23 18:20 | Read:4265 | Comments:0 | Tags:Off Topic Information Security IT sysadmin women

Women in Information Security: Kat Sweet

Women are vital to the information security field, but there are relatively few of us. Speaking to women in our industry gleams insights about how we’ve ended up in that male dominated field and perhaps how to attract more of us.I first interviewed Tiberius Hefflin, a Scottish security analyst who’s working in the United States. Then I spoke to T
Publish At:2016-11-17 14:50 | Read:3186 | Comments:0 | Tags:Off Topic Information Security IT Network Security women

Understand and Managing Change: Why We Shouldn’t Rely on the Human Element

At some point in our lives, we have all experienced a time when we had something break, quit working, or at the very least not work the way we expected. After exhausting our personal skills in trying to figure out how to fix the problem, we end up calling the repairman – the expert that will help us get back on track.In the IT Ops and IT Security worlds, the
Publish At:2016-11-12 22:57 | Read:3333 | Comments:0 | Tags:Featured Articles Security Configuration Management Change I

Women in Information Security: Tiberius Hefflin

Information security is the fastest growing area of IT. It affects more people in more ways than ever before. It affects not only our public records, our utilities, our white-collar work, and our entertainment. Now that we carry small computers in our pockets and in our cars, talk of the Internet of Things (IoT) is also starting to become reality. That’
Publish At:2016-10-24 09:05 | Read:3119 | Comments:0 | Tags:Off Topic computer science Information Security Internet of

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud