HackDig : Dig high-quality web security articles

Top Phishing and Social Media Threats: Key Findings from the Quarterly Threat Trends & Intelligence Report

In today’s online landscape, it is crucial for organizations to stay on top of the threats that put their enterprises at risk. Agari and PhishLabs have put together their Quarterly Threat Trends & Intelligence Report detailing their analysis of phishing and social media attacks this quarter. The report presents statistics regarding the volume of attacks,
Publish At:2022-09-20 23:55 | Read:17691 | Comments:0 | Tags:IT Security and Data Protection Phishing social media Tactic

SecTor 2022: The Power of the Pico

I’m excited to share that I will be speaking at SecTor this year in the tools track. While the SecTor schedule is not yet finalized, I’m currently listed as speaking at 10:15am on October 6th. The talk, The Power of the Pico: Replacing Expensive Toys with the Raspberry Pi Pico, will cover how to use a Raspberry Pi Pico to perform BadUSB attacks. There are co
Publish At:2022-09-20 23:55 | Read:26196 | Comments:0 | Tags:Featured Articles IT Security and Data Protection BadUSB hac

What Are Privacy-Enhancing Technologies (PETs)? A Comprehensive Guide

Modern enterprises will have to work with customer data in one way or another. The COVID-19 pandemic proved that the only businesses that would survive the future were those willing to embrace technology. While technologies such as the Internet of Things, and artificial intelligence have undeniable benefits, they have also presented complications. Manag
Publish At:2022-09-20 23:55 | Read:27022 | Comments:0 | Tags:IT Security and Data Protection cryptography data data prote

The ClubCISO report reveals a fundamental shift in security culture

With business and technology becoming increasingly intertwined, organizations are being forced to rethink how they look at digital security. Once overlooked or viewed as a mere afterthought, today it has become a business-critical necessity. As a result, organizations across industry lines are racing to improve their security postures. Chief Information Secu
Publish At:2022-09-11 23:53 | Read:52315 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISO Infor

How to Correctly Classify Your Data in 2022

Data classification can feel like an overwhelming task, especially for organizations without a strong practice in place. As with any security approach, data classification is both crucial and tempting to avoid. Regardless of whether the value is recognized, there’s a chance that it gets pushed further and further down the priority list in favor of items that
Publish At:2022-09-11 23:53 | Read:53262 | Comments:0 | Tags:Featured Articles IT Security and Data Protection compliance

Warning issued about Vice Society ransomware gang after attacks on schools

A ransomware gang that has been increasingly disproportionately targeting the education sector is the subject of a joint warning issued by the FBI, CISA, and MS-ISAC.The Vice Society ransomware group has been breaking into schools and colleges, exfiltrating sensitive data, and demanding ransom payments. The threat? If the extortionists aren’t paid, you
Publish At:2022-09-08 11:59 | Read:68181 | Comments:0 | Tags:IT Security and Data Protection CIS CISA FBI ransomware rans

Working Abroad as a Cybersecurity Professional: What You Need to Know

The world is becoming a smaller place. The prospect of working in another country becomes increasingly realistic and even promising as businesses migrate toward the cloud and collaborate more closely with international partners. Amid this shift, cybersecurity professionals may wonder if they can work abroad.Cybersecurity is a worldwide concern, creating plen
Publish At:2022-09-07 23:53 | Read:72044 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cybersecur

CISO Interview Series: The thinking of a CISO at the front end of the cyber threat landscape.

What are the most important areas for a CISO to focus on?  When speaking to Aman Sood, it becomes clear that the job of a CISO encompasses every aspect of a business.  Aman is the Head of Cyber Security with Jimdo, a website building platform that helps small businesses start, grow, and ultimately thrive online.  Aman is also the Cyber Securit
Publish At:2022-09-06 23:53 | Read:45452 | Comments:0 | Tags:IT Security and Data Protection CISO Cyberattacks Interview

FBI issues warning after crypto-crooks steal $1.3 billion in just three months

Amid a wave of hacks that have cost investors billions of dollars worth of cryptocurrency, the FBI is calling on decentralised finance (DeFi) platforms to improve their security.In a warning posted on its website, the FBI said that cybercriminals are increasingly targeting DeFi platforms to steal cryptocurrency, often exploiting vulnerabilities in smart cont
Publish At:2022-09-01 14:35 | Read:34306 | Comments:0 | Tags:IT Security and Data Protection cryptocurrency cybercriminal

Key Points from the IBM Cost of a Data Breach Report 2022

The volume and impact of data breaches have accelerated largely in 2022, which has contributed to many adverse effects for businesses. Tc highlights several updated factors that have generated great costs across 17 countries and regions, and 17 industries. The report has included new related areas of analysis such as:Extended Detection and Response (XDR).Ris
Publish At:2022-08-28 19:21 | Read:43256 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Cost of Da

LastPass attackers steal source code, no evidence users’ passwords compromised

LastPass, the popular password manager used by millions of people around the world, has announced that it suffered a security breach two weeks ago that saw attackers break into its systems and steal information.But don’t panic just yet – that doesn’t mean that all of your passwords are now in the hands of internet criminals. Although the br
Publish At:2022-08-26 11:49 | Read:42374 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

5 Things We Learned from The Definitive Guide to Data Loss Prevention (DLP)

In the context of hybrid work, the threat of data loss is rampant. Cybersecurity systems that were once designed to operate within the confines of a network perimeter have become obsolete, with employees using various devices, networks, and applications to get their work done. As such, it’s easier than ever for companies to be vulnerable to the loss of sensi
Publish At:2022-08-24 00:07 | Read:35444 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data Data

Privacy in Q2 2022: US, Canada, and the UK

The second quarter of 2022 offered plenty of positing on privacy, both in the U.S. and internationally. In the U.S., we saw the addition of another state privacy law, and a spark of hope in privacy professionals’ eyes with the introduction of tangible federal legislation. Plus, the Federal Trade Commission (FTC) is positioned to act on rulemaking like never
Publish At:2022-08-24 00:07 | Read:41225 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Canada dat

Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results

This year marks the eighth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems collects data about how companies utilize the IBM i platform and the IT enterprises it helps. Year after year, the survey has started to demonstrate long-term directions that provide useful information about the future of this entrusted technology.Despi
Publish At:2022-08-16 01:43 | Read:82283 | Comments:0 | Tags:IT Security and Data Protection IBM infrastructure Regulatio

Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

Ransomware is to blame for the closure of all 175 7-Eleven stores in Denmark on Monday.The retailer closed all of its stores in Denmark after its cash registers and payment systems were brought down in the attack.Initially, 7-Eleven’s Danish division did not say that ransomware was responsible for its problems, simply describing the incident as a ̶
Publish At:2022-08-12 05:05 | Read:43149 | Comments:0 | Tags:Featured Articles IT Security and Data Protection ransomware


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud