HackDig : Dig high-quality web security articles

Top 5 Security Trends this Summer: RSA Conference & Black Hat 2022

The RSA Conference 2022 – one of the world’s premier IT security conferences – was held June 6th-9th in San Francisco. The first in-person event for RSA since the global pandemic had a slightly lower turnout than in years past (26,000 compared to 36,000 attendees). But attendees and presenters alike made up for it with their eagerness to explore emerging IT
Publish At:2022-07-25 19:21 | Read:317 | Comments:0 | Tags:Business + Partners Threat Intelligence cyber resilience inf

Why Security Configuration Management (SCM) Matters

In the Godfather Part II, Michael Corleone says, “There are many things my father taught me here in this room. He taught me: keep your friends close, but your enemies closer.” This lesson Vito Corleone taught his son Michael is just as applicable to IT security configuration management (SCM).Faster breach detectionToday’s cyber threat landscape is extremely
Publish At:2022-07-04 06:20 | Read:425 | Comments:0 | Tags:Featured Articles Security Configuration Management Infosec

Threat actors target the infoSec community with fake PoC exploits

Researchers uncovered a malware campaign targeting the infoSec community with fake Proof Of Concept to deliver a Cobalt Strike beacon. Researchers from threat intelligence firm Cyble uncovered a malware campaign targeting the infoSec community. The expert discovered a post where a researcher were sharing a fake Proof of Concept (POC) exploit cod
Publish At:2022-05-23 03:11 | Read:909 | Comments:0 | Tags:Breaking News Hacking Intelligence hacking news information

World Password Day and the importance of password integrity

Passwords have become a common way to access and manage our digital lives. Think of all the accounts you have with different providers. Having a password allows you to securely access your information, pay bills or connect with friends and family on various platforms. However, having a password alone is not enough. Your password for each of your accounts nee
Publish At:2022-05-03 20:25 | Read:2031 | Comments:0 | Tags:Home + Mobile cyber resilience infosec

The Top 10 Highest Paying Jobs in Information Security – Part 1

Want a job in cybersecurity? There are plenty to go around. Cybersecurity Ventures estimated that there will be 3.5 million job openings in the industry by the end of the year. That makes sense. According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. Organizations are going to n
Publish At:2021-08-17 06:45 | Read:2448 | Comments:0 | Tags:Featured Articles Off Topic Information Security Infosec job


SIEM (pronounced like “sim” from “simulation”), which stands for Security Information and Event Management, was conceived of as primarily a log aggregation device. However, a SIEM’s primary capabilities are to provide threat detection, better enable incident investigation, and speed up your incident response time, while also giving you a unified, holistic vi
Publish At:2021-07-20 07:05 | Read:3368 | Comments:0 | Tags:Featured Articles Incident Detection Log Management and SIEM

A week in security (April 26 – May 2)

Last week on Malwarebytes Labs, we looked at which age range is most likely to be targeted by online predators, talked to Malwarebytes CISO John Donovan on our Lock and Code podcast, and explored the latest deepfake happenings. We also dug into a supply chain attack, discussed threats from a ransomware group, and did a deep dive on wallet recovery code scams
Publish At:2021-05-03 14:29 | Read:1603 | Comments:0 | Tags:A week in security a week in security awis infosec malware n

Careers in cybersecurity: Malwarebytes talks to teachers and students

Every year, I take part in talks for universities and schools. The theme is often breaking into infosec. I give advice to teens considering pursuing tech as a further area of study. I explain a typical working day for degree undergraduates. Sometimes I’m asked to give examples of conference talks. I get to dust off some oldies and give a snapshot of security
Publish At:2021-03-16 17:12 | Read:1966 | Comments:0 | Tags:Careers careers education infosec infosecurity schools unive

Lock and Code S1Ep9: Strengthening and forgetting passwords with Matt Davey and Kyle Swank

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Matt Davey, chief operations optimist at 1Password, and Kyle Swank, a member of 1Password’s security team, about—what else—passwords. We may know it’s important to have a strong, non-guessable, lengthy passw
Publish At:2020-06-22 11:28 | Read:2517 | Comments:0 | Tags:A week in security a week in security awis casting infosec l

National Poetry Month – Cybersecurity Edition

April is National Poetry Month, a time when we can celebrate poets and their craft. To join in the celebrations, we at the State of Security asked employees at Tripwire and in the wider infosec community to create and share some of their favorite cybersecurity-related poems with us.Here are some of our favorites from Twitter:Did you know April is #NationalPo
Publish At:2020-05-03 08:04 | Read:2634 | Comments:0 | Tags:Off Topic cybersecurity Infosec Poems

Podcast Episode 4: Understanding the Impact of the Skills Gap on the Infosec Market

Listen and subscribe to our new podcast! Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practice
Publish At:2020-03-24 05:35 | Read:3351 | Comments:0 | Tags:Podcast Infosec skills gap

How Organizations Can Fight to Retain Talent Amidst the Infosec Skills Gap

In a previous post, I shared some expert insight into how organizations can address the challenges of hiring skilled talent despite the ongoing infosec skills gap. Organizations can’t rest easy once they’ve brought on new talent, however. They need to make sure they hold onto their existing workforce.That’s easier said than done. Cybersecurity Ventures forec
Publish At:2020-03-23 06:49 | Read:2979 | Comments:0 | Tags:Featured Articles Infosec retaining talent skills gap

Coronavirus impacts security conferences and events: check your schedule

With coronavirus starting to take hold globally, international travel restrictions are kicking in and more workplaces are advising to work from home whenever possible. When self-isolation is a potential solution, public gatherings are increasingly looking like a terrible idea. Events are becoming a bit of a hotspot for cases, leading to inevitably bizarre sc
Publish At:2020-03-12 15:31 | Read:3191 | Comments:0 | Tags:Security world black hat bsides cancellations conferences co

Mental Health for Hackers: Contents Under Pressure

In 2011, I was in the middle of sitting down when I suddenly felt prickling sensations start from my toes, spread up my legs, and make their way into my arms. I was gasping for air. As the sensation traveled up my spine, it overwhelmed my head, and my heart struggled to keep up. Desperate for air and covered in tears, I started praying. I was scared for my l
Publish At:2020-02-19 00:33 | Read:2751 | Comments:0 | Tags:Events Infosec mental health RSAC

A week in security (January 27 – February 2)

Last week on Malwarebytes Labs, we looked at the strengths and weaknesses of the Zero Trust model, gave you the low-down on spear phishing, and took a delve into the world of securing the managed service provider (MSP). Other cybersecurity news UN compromised via Sharepoint hack: An extraordinary tale highlighting that absolutely nobody is safe when bad thi
Publish At:2020-02-03 16:50 | Read:3660 | Comments:0 | Tags:A week in security a week in security cybersecurity news inf


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud