HackDig : Dig high-quality web security articles for hackers

Strengthen Cybersecurity With These 3 Steps to Rapid Response

Planning for Rapid Response Will Help Ensure You Have a Foundation in Place During Times of CrisisCrises and outbreaks change us and society, with the war against COVID-19 having the most dramatic impact in recent memory. Every aspect of our existence is different, including new ways of working, communicating, conducting business, and taking care of ourselve
Publish At:2020-06-04 11:15 | Read:72 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response

Data From Joomla Resources Directory Exposed via Unprotected AWS Bucket

An unprotected Amazon Web Services (AWS) S3 bucket exposed the details of 2,700 users who signed up for the Joomla Resources Directory (JRD), Joomla’s Incident Response Task Group reported last week.An internal website audit revealed that a third-party company owned by a former leader of the Joomla Resource Directory team — they are still a member of the JRD
Publish At:2020-06-01 13:46 | Read:125 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Audits Incident Response Data Pr

Stronger Together — Building Cyber Resilience

In January, the World Economic Forum (WEF) again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of working underwent a drastic change due to the global pandemic. With so many employees working remotely and many business functions now in the cloud, organizations are rethinking
Publish At:2020-06-01 07:09 | Read:157 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Realizing the Potential of AI-Driven Security Operations

Managing security is an increasingly complicated task for a number of reason. First, networks are expanding rapidly, and many organizations have found that their visibility across the network has been significantly reduced. Siloed security tools and isolated network development and security projects have resulted in vendor sprawl, which means more management
Publish At:2020-05-24 07:51 | Read:109 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response

Data Breach Hits Florida Unemployment System

Some Florida residents who have made unemployment claims may have had personal data stolen, officials said Thursday.The Florida Department of Economic Opportunity has notified 98 people who were part of a data breach associated with unemployment claims, agency spokeswoman Paige Landrum said in an email. Officials didn’t say when the breach occurred, how many
Publish At:2020-05-24 07:50 | Read:126 | Comments:0 | Tags:NEWS & INDUSTRY Incident Response Cybercrime Management

Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform

Security teams today are facing increased challenges due to the “new normal” created by the recent global health crisis. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees must move to a virtual security operations center (SOC) model while address
Publish At:2020-05-24 06:18 | Read:137 | Comments:0 | Tags:CISO Cloud Security Incident Response Automation Cloud Servi

Microsoft Open-Sources COVID-19 Threat Intelligence

Microsoft this week announced that it has made some of its COVID-19 threat intelligence available to the public. The number of attacks targeting organizations and individuals worldwide using coronavirus lures has increased dramatically over the past several months, and Microsoft says it wants to help even those who do not use its threat protection solut
Publish At:2020-05-18 13:54 | Read:232 | Comments:0 | Tags:NEWS & INDUSTRY Incident Response

Linksys Prompts Password Reset to Prevent Router Hacking

Linksys has prompted users to reset passwords after learning that hackers were leveraging stolen credentials to change router settings and direct customers to malware.The issue became apparent after the company’s users started seeing an increasing number of messages in their web browsers, instructing them to download COVID-19-related applications that were,
Publish At:2020-04-16 09:49 | Read:446 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Incident Response Ma

Shipping Giant MSC Confirms Outage Caused by Malware Attack

Swiss-based global shipping giant Mediterranean Shipping Company (MSC) has confirmed that a recent outage was caused by a malware attack that affected its headquarters in Geneva.MSC informed customers on April 10 that its website, msc.com, and its myMSC customer and vendor portal had become unavailable due to a network outage at one of the company’s data cen
Publish At:2020-04-16 09:49 | Read:479 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Incident Response Vi

Extend Your Incident Response Program to DevOps With Security Automation

One of the biggest challenges facing security teams when it comes to incident response is complexity. The continual growth in volume and severity of cyberattacks has led to increased business process and technical complexity as different threat vectors have required security leaders to purchase point solutions with unique user interfaces, custom APIs and bus
Publish At:2020-04-15 07:54 | Read:398 | Comments:0 | Tags:Incident Response Automation Collaboration Data Breaches Dev

TA505 Continues to Infect Networks With SDBbot RAT

IBM X-Force Incident Response and Intelligence Services (IRIS) responds to security incidents around the globe. During analysis and comparison of malicious activity on enterprise networks, our team identified attacks likely linked to Hive0065, also known as TA505. We observed that Hive0065 continues to spread the SDBbot remote-access Trojan (RAT) alongside o
Publish At:2020-04-14 12:36 | Read:482 | Comments:0 | Tags:Advanced Threats Incident Response Command-and-Control (C&C)

Backup or Disaster Recovery for Protection Against Ransomware?

Is Backup Alone Enough, or is Full Disaster Recovery Required to Mitigate the Threat of Ransomware?To pay, or not to pay? Is it better to suffer the pain and outage of ransomware – or pay up, and by doing so, end it?Like all such questions, there is no easy or simple answer. Can the affected organization afford a loss of operation? Does it have SLAs that wil
Publish At:2020-04-14 07:20 | Read:441 | Comments:0 | Tags:Disaster Recovery NEWS & INDUSTRY Incident Response

China-Linked Hackers Systematically Targeted Linux Servers for Years

Hackers Operating in the Interest of the Chinese Government Systematically Targeted Linux Servers, Windows Systems and Mobile Devices Activity associated with five cyber-espionage groups acting in the interest of the Chinese government remained undetected for almost a decade, security researchers at BlackBerry say. Successfully conducting cross-pla
Publish At:2020-04-09 01:36 | Read:552 | Comments:0 | Tags:NEWS & INDUSTRY Incident Response Malware

NASA Sees Increase in Cyberattacks During Coronavirus Outbreak

A memo sent out this week to all NASA personnel warns that the agency has seen a significant increase in cyberattacks, including phishing and malware attacks, while its employees work remotely during the COVID-19 outbreak.The memo, obtained by space news website SpaceRef, reveals that the number of email phishing attempts doubled in the past few days and the
Publish At:2020-04-08 10:14 | Read:494 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Incident Response Ph

How Humans "LEAD" the Way to More Effective Use of Threat Intelligence

When the theme, Human Element, was announced for RSA Conference 2020 (RSAC), I was gratified. It’s a topic I never tire of because not only do I believe that there is no “silver bullet” technology, I believe it’s the humans who really lead the way to greater security efficiency and effectiveness. So, while at the conference I took the opportunity to view eve
Publish At:2020-04-02 20:02 | Read:462 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response


Share high-quality web security related articles with you:)


Tag Cloud