HackDig : Dig high-quality web security articles for hacker

Cyber News Rundown: Ryuk Uses Wake-on-Lan

Reading Time: ~ 2 min. Ryuk Adds New Features to Increase Devastation The latest variant of the devastating Ryuk ransomware has been spotted with a new feature that allows it to turn on devices connected to the infected network. By taking advantage of Wake-on-Lan functionality, Ryuk can is able to mount additional remote devices to further its encryption
Publish At:2020-01-17 09:15 | Read:142 | Comments:0 | Tags:Industry Intel ransomware

Cyber News Rundown: Snake Ransomware

Reading Time: ~ 2 min. Snake Ransomware Slithers Through Networks A new ransomware variant, dubbed “Snake,” has been found using more sophisticated obfuscation while targeting entire networks, rather than only one machine. In addition, Snake will append any encrypted file extensions with five random characters following the filetype itself. Finally, the i
Publish At:2020-01-10 09:10 | Read:219 | Comments:0 | Tags:Industry Intel ransomware

Cyber News Rundown: US Coast Guard Hit with Ransomware

Reading Time: ~ 2 min. US Coast Guard Facility Hit with Ransomware During the last week of December a US Coast Guard facility was the target of a Ryuk ransomware attack that shut down operations for over 30 hours. Though the Coast Guard has implemented multiple cybersecurity regulations in just the last six months or so, this attack broke through the weak
Publish At:2020-01-03 15:10 | Read:343 | Comments:0 | Tags:Industry Intel malware ransomware

Cyber News Rundown: Honda Customer Data Leak

Reading Time: ~ 2 min. Honda Customer Database Exposed Officials have been working over the past work to secure a database containing highly sensitive information belonging to more than 26,000 North American customers of the Honda motor company. The database in question was originally created in October and was only discovered on December 11. While no fin
Publish At:2019-12-20 09:10 | Read:248 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Zeppelin Ransomware

Reading Time: ~ 2 min. Zeppelin Ransomware Spreading Over the last month, researchers have been monitoring the spread of a new ransomware variant, Zeppelin. This is the latest version of the ransomware-as-a-service that started life as VegaLocker/Buran and has differentiated itself by focusing on healthcare and IT organizations in both the U.S. and Europe
Publish At:2019-12-13 15:11 | Read:434 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: ZeroCleare Malware

Reading Time: ~ 2 min. ZeroCleare Malware Wiping Systems IBM researchers have been tracking the steady rise in ZeroCleare deployments throughout the last year, culminating in a significant rise in 2019. This malware is deployed on both 32 and 64-bit systems in highly targeted attacks, with the capability to completely wipe the system by exploiting the Eld
Publish At:2019-12-06 09:10 | Read:315 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Shade Ransomware Most Distributed Variant

Reading Time: ~ 2 min. Shade Ransomware Takes Crown as Most Distributed Variant Over the course of 2019, one ransomware variant, known as Shade, has taken over 50 percent of market share for ransomware delivered via email. Otherwise known as Troldesh, this variant receives regular updates to further improve it’s encrypting and methods of generating additi
Publish At:2019-11-22 15:10 | Read:321 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Orvis Password Leak

Reading Time: ~ 2 min. Orvis Internal Credentials Leaked A database containing login credentials for numerous internal systems belonging to Orvis, one of America’s oldest retailers, was found to be publicly available for an unknown amount of time. Why the database was publicly accessible at all is still unclear, but the retailer has determined that many c
Publish At:2019-11-15 15:10 | Read:311 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Bed, Bath, & Beyond Data Breach

Reading Time: ~ 2 min. Bed, Bath, & Beyond Data Breach An official announcement made earlier this week acknowledged illicit access to customer data used in online accounts for Bed, Bath, & Beyond. While the breach didn’t affect payment card information, the retailer quickly began contacting affected customers and took steps to safeguard against fu
Publish At:2019-11-12 03:10 | Read:348 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Nikkei BEC Scam

Reading Time: ~ 2 min. BEC Scam Takes Millions from Nikkei America Officials for Nikkei are working to identify the perpetrators of a recent business email compromise (BEC) scam that took roughly $29 million from the company’s American subsidiary. The illicit transfer took place sometime during the end of September and, though they did make a public state
Publish At:2019-11-12 03:10 | Read:263 | Comments:0 | Tags:Industry Intel

Healthcare Cyber Threats That Should Keep You up at Night

Reading Time: ~ 4 min. In my previous blog post, Why Healthcare Organizations are Easy Targets for Cybercrime, I discussed various reasons that hospitals and healthcare organizations make desirable and lucrative targets for hackers. In this second installment, I’ll go over how criminals are attacking these organizations, the methods they use, and also what n
Publish At:2019-10-29 08:10 | Read:1041 | Comments:0 | Tags:Industry Intel

Why Healthcare Organizations are Easy Targets for Cybercrime

Reading Time: ~ 3 min. Certain types of cybercrime targets always make headlines. In this two-part series, we’ll get into a pretty serious one: your health, and why hackers are targeting the healthcare industry for profit. The Short Answer: Medical Data is Worth a Lot Stolen medical data is valuable, plain and simple. In a Phishlabs study from 2014, he
Publish At:2019-10-24 21:10 | Read:579 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Cryptomining WAV Files

Reading Time: ~ 2 min. Cryptominers Found in Audio Files Researchers have recently found that both cryptominers and backdoors are being deployed within WAV audio files on targeted systems. Using steganography, attackers can include components for both loading and executing malicious scripts, while still allowing some audio files to play normally. Along wi
Publish At:2019-10-18 08:10 | Read:515 | Comments:0 | Tags:Industry Intel cryptocurrency

Cyber News Rundown: E-Scooters Vulnerable

Reading Time: ~ 2 min. E-Scooter Security Vulnerability A security researcher recently found an API vulnerability within the software of Voi e-scooters that allowed him to add over $100,000 in ride credits to his account. The vulnerability stems from a lack of authentication after creating an account which allows users to enter an unlimited number of prom
Publish At:2019-10-11 11:15 | Read:412 | Comments:0 | Tags:Industry Intel

Cyber News Rundown: Data Dash

Reading Time: ~ 2 min. DoorDash Data Breach Nearly five months after a breach, DoorDash has just now discovered that unauthorized access to sensitive customer information has taken place. Among the stolen data were customer names, payment history, and contact info, as well as the last four digits of both customer payment cards and employee bank accounts.
Publish At:2019-10-04 16:10 | Read:788 | Comments:0 | Tags:Industry Intel data breach ransomware


Share high-quality web security related articles with you:)


Tag Cloud