HackDig : Dig high-quality web security articles for hackers

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protection of our personal data a fundamental human right. But that was then. What is shaping today’s cybersecurity?
Publish At:2020-06-18 00:31 | Read:205 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI Cloud C

Odd Protest-Themed Spam Messages Targeted Atlanta Police Foundation

Security researchers came across a series of odd protest-themed spam email messages that appeared to target the Atlanta Police Foundation.SANS’ Internet Storm Center observed that the spam messages first appeared to be instances of an extortion scam campaign.With “Crime Research Center” as the sender, the emails claimed in their messages th
Publish At:2020-06-17 11:45 | Read:95 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Atlanta

Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information.SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites. They used those profiles and the stated interest of finding “good times” to
Publish At:2020-06-16 16:30 | Read:159 | Comments:0 | Tags:IT Security and Data Protection Latest Security News data se

Extortionists Preying on Site Owners with Fake Website Hacking Scam

Researchers found that extortionists are targeting website owners with a scam in which they claim to have hacked their site and extracted a database.WebARX observed that the ploy first makes itself known to website owners when they receive a ransom message from the attackers.In a sample note analyzed by the web application security platform, the scammers cla
Publish At:2020-06-15 10:44 | Read:174 | Comments:0 | Tags:IT Security and Data Protection Latest Security News extorti

Building on the IAM Benefits of SSO with MFA and Privileged Access Management

In part one of this post, we talked about why identity access management (IAM) is important.  In that discussion, we identified three types of IAM:Single Sign OnMulti-Factor AuthenticationPrivileged Access ManagementWe discussed the different types of single sign on and some examples of what can be used to help streamline the user experience.  Let’s now disc
Publish At:2020-06-14 23:09 | Read:171 | Comments:0 | Tags:IT Security and Data Protection Access Management identity a

The Importance of Implementing an Information Security Policy That Everyone Understands

Information security (IS) and/or cybersecurity (cyber) are more than just technical terms. They’re the processes, practices and policy that involve people, services, hardware, and data. In particular, IS covers how people approach situations and whether they are considering the “what if’s” of malicious actors, accidental misuse, etc.I’m not sure about your o
Publish At:2020-06-14 23:09 | Read:162 | Comments:0 | Tags:IT Security and Data Protection Access Management cybersecur

SNAKE Ransomware Affected Enel Group’s Internal Network

Italian multinational energy company Enel Group suffered a SNAKE ransomware infection that affected its internal network.According to a statement issued by Enel Group, the ransomware attack first registered with the energy company on June 7 when its internal IT network suffered a disruption. A spokesperson for the company said that officials isolated its cor
Publish At:2020-06-12 09:23 | Read:113 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Enel Gr

Trickbot Using Fake Black Lives Matter Voting Campaign for Distribution

Security researchers came across an attack email that leveraged a fake Black Lives Matter voting campaign to distribute Trickbot malware.Digital security firm Abuse.ch found that the attack email pretended to originate from a sender known as “Country administration.” Building on its subject line “Vote anonymous about Black Lives Matter,R
Publish At:2020-06-11 10:13 | Read:161 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Black L

Babylon Health App Leaked Patients’ Video Consultations

Babylon Health, makers of a smartphone app that allows Brits to have consultations with NHS doctors, has admitted that a “software error” resulted in some users being able to access other patients’ private video chats with GPs.The data breach came to light after one user, Rory Glover, tweeted that he was shocked to find the app’s R
Publish At:2020-06-11 10:13 | Read:178 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Babylon he

Ragnar Locker Partnered with Maze Ransomware Cartel

The actors behind Ragnar Locker partnered with the Maze ransomware gang as a means of extorting victims whose unencrypted data they had stolen.On June 8, the operator of the “Ransom Leaks” Twitter account revealed that Maze ransomware had begun using its infrastructure to share data leaks perpetrated by Ragnar Locker.#MazeRansomware cartel is rea
Publish At:2020-06-10 11:03 | Read:163 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Maze Ra

U.S. Utilities Targeted with FlowCloud Malware by LookBack Attackers

The digital attackers responsible for distributing LookBack malware targeted U.S. utility providers with a new threat called “FlowCloud.”Proofpoint first observed threat actors attempting to spread FlowCloud in mid-July 2019. At that time, the security firm detected phishing campaigns whose attack emails employed subject lines such as “PowerSafe
Publish At:2020-06-09 08:02 | Read:136 | Comments:0 | Tags:IT Security and Data Protection Latest Security News FlowClo

How ExpertOps Can Help You Address the Infosec Skills Gap

Are you struggling to hire skilled digital security talent in 2020? If so, you’re not alone. According to a Tripwire study on the infosec skills gap, 82% of security experts said that their teams were understaffed; nearly the same proportion (83%) indicated that they were feeling more overworked going into 2020 than they were a year prior.It doesn’t appear t
Publish At:2020-06-09 00:19 | Read:200 | Comments:0 | Tags:IT Security and Data Protection Cloud ExpertOps SECaaS

Zorab Ransomware Disguised as STOP Djvu Ransomware Decryptor

A security researcher discovered a new ransomware strain called “Zorab” masquerading as a decryptor for STOP Djvu ransomware.Michael Gillespie, creator of the Ransomware ID service, spotted Zorab being distributed as a decryptor for the STOP Djvu family.A relatively common ransomware strain, STOP Djvu was involved in various digital attacks over
Publish At:2020-06-08 08:52 | Read:132 | Comments:0 | Tags:IT Security and Data Protection Latest Security News ransomw

HyperBeard Fined $150K for Allegedly Collecting Children’s Data Illegally

The U.S. Federal Trade Commission (FTC) fined app developer HyperBeard $150,000 for allegedly collecting children’s data in an unlawful way.On June 4, the FTC announced that HyperBeard had agreed to pay a fine of $150,000 and to delete any information it had collected from children under the age of 13 in order to settle allegations against it.A complai
Publish At:2020-06-05 11:00 | Read:293 | Comments:0 | Tags:IT Security and Data Protection Latest Security News fine FT

The scammer who tried to launder over $500,000 through Business Email Compromise

A 64-year-old man has pleaded guilty in a Texan court to charges of money laundering after a series of attacks that defrauded companies out of hundreds of thousands of dollars.Kenenty Hwan Kim (who sometimes went by the name Myung Kim) took advantage of a simple trick that has proven highly effective to fraudsters in recent years.The method of tricking busin
Publish At:2020-06-04 12:13 | Read:181 | Comments:0 | Tags:Featured Articles IT Security and Data Protection BEC BEC sc

Announce

Share high-quality web security related articles with you:)

Tools