HackDig : Dig high-quality web security articles

A quick round up of privacy highlights for Q1 of 2021

As expected, the start of 2021 has seen unprecedented movement in the U.S. with 22 states introducing comprehensive privacy legislation and even more introducing specific-use legislation. To date, hundreds of privacy bills were introduced across the states; to give some perspective, more than 50 privacy bills were introduced in New York alone. Undoubtedly a
Publish At:2021-04-16 00:37 | Read:176 | Comments:0 | Tags:IT Security and Data Protection legislation Privacy United S

Beware of These 3 Scams Making the Rounds This Tax Season

On March 17, the U.S. Internal Revenue Service (IRS) and the Treasury Department announced the extension of the federal income tax filing due date from April 15, 2021 to May 17, 2021. This decision is designed “to help taxpayers navigate the unusual circumstances related to the pandemic,” IRS Commissioner Chuck Rettig explained in a news release. But it also
Publish At:2021-04-15 01:07 | Read:163 | Comments:0 | Tags:IT Security and Data Protection IRS Scammers tax returns Tre

Ghidra 101: Creating Structures in Ghidra

In this blog series, I will be putting the spotlight on useful Ghidra features you may have missed. Each post will look at a different feature and show how it helps you save time and be more effective in your reverse engineering workflows. Ghidra is an incredibly powerful tool, but much of this power comes from knowing how to use it effec
Publish At:2021-04-13 02:07 | Read:183 | Comments:0 | Tags:Cyber Security IT Security and Data Protection data types Gh

Integrity: How It’s More than Just Data Security and FIM

Integrity is a word thrown around a lot in the cybersecurity space. That’s not surprising. It is one of the three components that make up the CIA Triad, after all. However, the meaning and use of the word has been relatively limited in many security circles up until now.Let’s take a look at the security industry more broadly. In most conversations dealing wi
Publish At:2021-04-08 00:55 | Read:160 | Comments:0 | Tags:IT Security and Data Protection CIA data integrity data secu

A new headache for ransomware-hit companies. Extortionists emailing your customers

Cybercriminal extortionists have adopted a new tactic to apply even more pressure on their corporate victims: contacting the victims’ customers, and asking them to demand a ransom is paid to protect their own privacy.At the end of March, Bleeping Computer reported that the Clop ransomware gang had not stopped at threatening hacked companies and contact
Publish At:2021-04-07 09:19 | Read:137 | Comments:0 | Tags:IT Security and Data Protection cyberattack cybercrime email

Role of Encryption in GDPR Compliance

Encryption has been a hot topic of discussion during the implementation phase of most data privacy laws. In the age where organizations are dealing with large volumes of data each day, the protection of this sensitive data is critical. The data, which is seen as a business-critical asset for organizations, should be protected against malicious hackers lookin
Publish At:2021-03-31 05:36 | Read:191 | Comments:0 | Tags:IT Security and Data Protection compliance data encryption G

CISO Soup: Data Breaches, Strategy and Cybersecurity Culture

For the longest time, those of us who occupy the role of the CISO have fought for our seat at the ‘big table.’ Although it appears some of us are being invited into the C-suite, there is still a long way for us to go.This is highlighted in a 2021 report provided BT, which places “CISOs under the spotlight” and illuminates some interes
Publish At:2021-03-22 06:56 | Read:300 | Comments:0 | Tags:IT Security and Data Protection CISO cyber security culture

Security vs. Compliance: What’s the Difference?

Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team or two great tastes that go great together.As much as I would like to see auditors, developers, and security analysts living in harmony like a delicious Reese’s cup, a recent gap analysis that I was part of reminded me t
Publish At:2021-03-17 06:02 | Read:176 | Comments:0 | Tags:IT Security and Data Protection Regulatory Compliance Risk-B

4 Strategies to Mitigate Pass-the-Cookie Attacks

Another year, another new set of cybersecurity threats to overcome, outwit and mitigate against. At the beginning of 2021, the cybersecurity world was informed by CISA (the USA Cybersecurity and Infrastructure Security Agency) of a spate of attacks targeting cloud environment configurations, supposedly occurring as a result of the increase in remote working.
Publish At:2021-03-17 02:08 | Read:259 | Comments:0 | Tags:IT Security and Data Protection cookie cyberattack data prot

Navigating Transformation with Managed Cybersecurity Services

The coronavirus pandemic has added new layers to the threat landscape facing corporate security leaders in 2020 and going into 2021, as well. As businesses and workforces sought to adapt rapidly to remote working at scale, malicious groups and other threat actors began exploiting opportunities to target stressed people and systems with malware. The malware –
Publish At:2021-03-16 00:00 | Read:315 | Comments:0 | Tags:IT Security and Data Protection digital transformation Exper

Criminals arrested after trusting encrypted chat app cracked by police

Police in the Netherlands and Belgium have made hundreds of raids, and arrested at least 80 people, after cracking into an encrypted phone network used by organised criminals.In a press release, Europol said that crime-fighting authorities in France, Belgium and the Netherlands had not only arrested a large number of suspected criminals, but also shut down t
Publish At:2021-03-11 13:32 | Read:247 | Comments:0 | Tags:IT Security and Data Protection apps encryption Europol poli

Combating Risk Negligence Using Cybersecurity Culture

With a growing number of threat sources and successful cybersecurity attacks, organizations find themselves in a tricky spot if they wish to survive cyberspace. Oftentimes, the adversaries are not the challenge; the obstacle is the organization’s culture. Just like culture influences who we are as a people, culture influences the cybersecurity tone of an org
Publish At:2021-03-11 01:50 | Read:252 | Comments:0 | Tags:IT Security and Data Protection compliance cyber security cu

The Security Wisdom of the All-Knowing CISO

Have you ever noticed how closely your role as the CISO of your organisation resembles that of the Wizard from “The Wizard of Oz?” As the Wizard, you are expected to be all-knowing, all-seeing and all-powerful. Your role is to keep everyone safe from the evils of the world while frantically pulling levers, pressing buttons and turning dials behind the curtai
Publish At:2021-03-03 02:44 | Read:262 | Comments:0 | Tags:IT Security and Data Protection CISO people processes Techno

Fixing the “Human Error” Problem

Last year, Verizon’s data breaches report showed that “human error” was the only factor with year-over-year increases in reported incidents. The average cost of data breaches from human error stands at $3.33 million, according to IBM’s Cost of a Data Breach Report 2020. Even big companies and government entities have fallen victim to data breaches caus
Publish At:2021-03-01 00:02 | Read:413 | Comments:0 | Tags:IT Security and Data Protection data breach Human Error

How Joining a Professional Community Can Supercharge Your Career and More

When I was a software developer, I never joined any dev communities. I didn’t see the point. I also worked evenings as a professional musician and mostly spent time within the music community and sports groups I was a part of. I spent time with my dev friends at work; I didn’t understand why I would want to know devs with whom I didn’t work. I was a senior d
Publish At:2021-02-16 00:02 | Read:335 | Comments:0 | Tags:IT Security and Data Protection Career community resources I