HackDig : Dig high-quality web security articles

Sextortion Scams – How They Persuade and What to Watch for

Extortion, and especially “sextortion” emails, are becoming more frequent, and they can be extremely alarming when received. Such emails work by using threats to extort money, evoking intense fear. This type of correspondence comes in many guises and features various elements, but essentially, they work in the same way.These activities can refer to real-life
Publish At:2021-09-22 00:40 | Read:106 | Comments:0 | Tags:IT Security and Data Protection cybercrime extortion Phishin

Everything You Need to Know about Cyber Crisis Tabletop Exercises

Cybersecurity has become a critical concern in every business sector nowadays due to organizations’ growing dependency on technologies. Research by Immersive Lab reported that in 2019 there were more than 20,000 new vulnerabilities. Not only that, TechRepublic reported that global companies experienced a 148% spike in ransomware attacks after COVID-19 hit th
Publish At:2021-09-20 00:40 | Read:179 | Comments:0 | Tags:IT Security and Data Protection CCTE cyber crisis tabletop e

The Digital Pandemic – Ransomware

In 2021, there are two words that can send a cold chill down the spine of any Cybersecurity professional and business leader; Phishing and Ransomware.Research carried out by the Data Analytics and training company CybSafe, identified that 22% of all cyber incidents reported in the first quarter of 2021 were ransomware attacks. According to the figures obtain
Publish At:2021-09-20 00:40 | Read:88 | Comments:0 | Tags:IT Security and Data Protection Cyberattacks malware mitigat

My “Cybercrime” Isn’t Your “Cybercrime”

Talk to cybersecurity experts about cybercrime on their network, and they will mention malicious activity like scans, attacks, events, and incidents. Probably at some point, they will slip into geek-speak with a vast array of confusing acronyms and jargon while explaining tactics and techniques by referencing infamous attacks, Internal protocols, and industr
Publish At:2021-09-13 00:39 | Read:227 | Comments:0 | Tags:IT Security and Data Protection cybercrime cyber

Data Breaches: A Chance for Opportunistic Scammers & What You Should Watch for

Data breaches are now part of doing business, with many companies having been affected. Data is very valuable to criminals because it is often used to commit fraudulent activities as well as to enhance the credibility of scams. Data that is stolen ranges from Social Security Numbers (SSNs) to other identification documents and payment details.Scammers can do
Publish At:2021-09-06 00:39 | Read:319 | Comments:0 | Tags:IT Security and Data Protection data breach identity theft P

5 Ways to Navigate the Threat Landscape Conveyed in Verizon’s DBIR 2021

On May 13, Verizon released its Data Breach Investigations Report (DBIR) 2021. This annual publication serves many purposes. It yields context into what security analysts are seeing, for instance. But it also affects organizations’ security postures at an even higher level.Here’s Anthony Israel-Davis, research and development manager at Tripwire, with more:O
Publish At:2021-09-06 00:39 | Read:260 | Comments:0 | Tags:IT Security and Data Protection DBIR Verizon DBIR

FBI warns of OnePercent ransomware gang – what you need to know

What’s happened?The FBI has published a warning about a ransomware gang called the OnePercent Group, which has been attacking U.S. companies since November 2020.How are companies being attacked by the OnePercent gang?The gang emails targeted individuals inside an organization using social engineering tricks to dupe the unwary into opening a malicious W
Publish At:2021-08-26 11:33 | Read:78 | Comments:0 | Tags:IT Security and Data Protection FBI OnePercent ransomware

How Tripwire Can Help to Defend Against Ransomware

Ransomware is having a bit of a moment. Check Point revealed that ransomware attacks increased 102% globally in H1 2021 compared to the start of the previous year, with the number of corporate ransomware victims having doubled over that same period. Average ransom payments also grew 171% from $115,123 in 2019 to $312,493 a year later. But those weren’t the a
Publish At:2021-08-24 00:08 | Read:222 | Comments:0 | Tags:IT Security and Data Protection File Integrity Monitoring (F

The Cost of a Data Breach Report: Key Highlights

IBM’s Cost of a Data Breach Report 2021 analyzed 537 real breaches and conducted nearly 3,500 interviews to uncover the true cost of a data breach in 2020. The publication covers initial attack vectors, how long it took organizations to discover and contain braces, as well as the effects that incident response efforts and artificial intelligence have on miti
Publish At:2021-08-20 01:44 | Read:356 | Comments:0 | Tags:IT Security and Data Protection Cost of Data Breach Study da

Want to ban someone from Instagram? That’ll cost you just $60

Got a grudge against an Instagram user? Well, scammers may just have the perfect service for you – at quite an affordable price.As Joseph Cox at Motherboard reports, the criminal underground has stepped beyond the likes of offering ransomware-as-a-service and DDoS-attacks-for-hire to advertise an easy way for anyone to target an Instagram account and h
Publish At:2021-08-19 10:00 | Read:414 | Comments:0 | Tags:IT Security and Data Protection cyber criminal cybercrime In

IT Risk Team Discovers Previously Unknown Vulnerability in Autodesk Software During Client Penetration Test

During a recent client engagement, the DGC penetration testing team identified a previously unknown vulnerability affecting the Autodesk Licensing Service, a software component bundled with nearly all licensed Autodesk products. The vulnerability exists in a software component common to most Autodesk products and impacts nearly all organizations using licens
Publish At:2021-08-18 10:24 | Read:497 | Comments:0 | Tags:IT Security and Data Protection CVE penetration testing vuln

Privacy in Q2: In Like a Lion, Out Like a … Lion

For a while, privacy in Q2 was looking like it would follow the season’s idiomatic rule: in like a lion, out like a lamb. But it came roaring back in June with a new U.S. state law, EU adequacy decisions, a new EU data transfer mechanism, and more. As we look back over the second quarter of 2021, several important developments are worth noting.U.S. State Pri
Publish At:2021-08-17 00:10 | Read:511 | Comments:0 | Tags:IT Security and Data Protection data privacy Law legislation

How Did the Cybersecurity Ecosystem Get So Clogged Up?

Today’s enterprise operations involve the coordination of several different digital ecosystems but none quite so inflamed as the cybersecurity ecosystem. Technology has been evolving at a rapid pace, and attackers are armed with advanced tactics to steal data and expose secure information. In response, cybersecurity teams deploy numerous tools and solutions
Publish At:2021-08-15 23:17 | Read:397 | Comments:0 | Tags:IT Security and Data Protection assets integration Security

How to Secure Hybrid Teams Against Insider Threats

As businesses emerge from the pandemic, many are making strategic decisions about their long-term work arrangements. While there is a substantial debate about remaining remote or bringing people back to the office, many companies are choosing to meet in the middle, embracing a hybrid work arrangement that allows people to work both on-site and remotely.Accor
Publish At:2021-08-12 00:53 | Read:578 | Comments:0 | Tags:IT Security and Data Protection data security Hybrid insider

Getting Application Security Back on the Rails

In its Interagency Report 7695, the National Institute of Standards and Technology (NIST) defined an application as “a system for collecting, saving, processing, and presenting data by means of a computer.” This broad term covers enterprise applications, consumer applications, and even phone apps. Security is important in all these types of applications
Publish At:2021-08-10 01:41 | Read:460 | Comments:0 | Tags:IT Security and Data Protection application application secu

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud