HackDig : Dig high-quality web security articles for hacker

Top Email Security Threats of 2020 – How To Stop Them

As hackers’ methods become more sophisticated, the scale of email security breaches and the frequency at which they occur grow greater with each passing year. In 2019 alone, an estimated 2 billion unique email addresses, accompanied by over 21 million unique passwords, were exposed within a single data breach. After the initial panic, it became clear that br
Publish At:2020-02-20 03:05 | Read:118 | Comments:0 | Tags:IT Security and Data Protection email security insider threa

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected more than 100 state and local governments, according to Recorded Future — and that’s just one threat vector. Municipalities are also at risk from insider threats, coordinated attacks and other perils. What is it about
Publish At:2020-02-17 18:22 | Read:199 | Comments:0 | Tags:Government Credit Card Data Cyberattacks Data Breaches Data

We Need More Than Security Awareness to Combat Insider Threats

When I was new to the security industry, I firmly believed that people got infected with malware because they didn’t know how to be safe online. I thought problems happened because computers were too complicated, or the technology was too daunting, or people were just too trusting and naive. But clearly I knew better. I saw the dangers lurking on the i
Publish At:2020-02-12 10:40 | Read:197 | Comments:0 | Tags:CISO Human Error Human Factor Insider Threats Security Aware

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The volume of threats that security teams see on a daily basis can make it especially difficult to look at the big picture when it comes to developing an effective cybersecurity strategy. To see through the flood of data and alerts, organizations depend on actionable threat intelligence to help them understand and mitigate risks. Looking at long-term trends
Publish At:2020-02-11 08:51 | Read:261 | Comments:0 | Tags:Advanced Threats Threat Intelligence Cloud Cloud Adoption Cl

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

Today, I’m pleased to share some of the key findings from the 2020 Cost of Insider Threats Global Report. This is the third benchmark study, independently sponsored by IBM Security and ObserveIT to help understand the direct and indirect costs that result from insider threats. The first study was conducted in 2016 and focused exclusively on companies i
Publish At:2020-02-09 10:30 | Read:121 | Comments:0 | Tags:CISO Security Services Access Management Breach Credentials

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his
Publish At:2020-01-28 16:50 | Read:334 | Comments:0 | Tags:Explained byod cloud framework identity management insider t

Report: Organizations remain vulnerable to increasing insider threats

The latest data breach at Capital One is a noteworthy incident not because it affected over 100 million customer records, 140,000 Social Security numbers (SSNs), and 80,000 linked bank accounts. Nor was it special because the hack was the result of a vulnerable firewall misconfiguration. Many still talk about this breach because a leak of this magnitude,
Publish At:2019-12-05 16:50 | Read:413 | Comments:0 | Tags:Awareness Carnegie Mellon University cert insider threat cen

Infographic: The Top Four Cybercrime Trends Are…

Would you seek medical treatment from someone who’s never actually practiced medicine, only studied it? What about take your car to a mechanic who’s never performed a repair? Probably not. You’d most likely feel comfortable only obtaining services from a professional who’s had practical experience in his or her trade. So why would you
Publish At:2015-11-18 21:35 | Read:3136 | Comments:0 | Tags:Advanced Threats Vulns / Threats Cybercrime IBM Emergency Re

A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015

This year has flown by! It seems like just yesterday IBM was presenting “2014: The Year That the Internet Fell Apart” at the InterConnect Conference. Aside from good holiday cheer, the end of the year is often a time when one reflects on past events and lessons learned. For this reason, the final issue of the 2015 IBM X-Force Threat Intelligence
Publish At:2015-11-17 09:30 | Read:2607 | Comments:0 | Tags:IBM X-Force IBM X-Force Security Research Indicators of Comp

The InfoSecond: July 13-17

Information security news develops and moves at a blistering pace. Blink and you might miss it. That’s precisely why we’ve developed The InfoSecond, a new weekly series dedicated to recapping the week’s best stories in brief so you can be best prepared to tackle the myriad of challenges that could impact your enterprise each week. The series will consist of
Publish At:2015-07-19 14:20 | Read:3183 | Comments:0 | Tags:Malware Advanced Persistent Threat (APT) Black Hat Dark Web

Identifying and Preventing Insider Threats

An insider attack is one of the biggest threats faced by modern enterprises, where even a good working culture might not be sufficient to prevent it. Companies implement sophisticated technology to monitor their employees but it’s not always easy for them to distinguish between an insider and an outside attack.Those who target and plan attacks from the outsi
Publish At:2014-10-20 04:55 | Read:3231 | Comments:0 | Tags:Featured Articles Incident Detection Bruce Schneier CERT Eug

AT&T hit by insider breach; "change your passcode" it warns

AT&T, one of the US's biggest telecoms, has fired an insider for having thumbed through customer accounts without authorization and potentially slurping customers' taxpayer IDs, driver license numbers and more.Sources familiar with the incident said about 1,600 people were affected, according to The Register.Michael A. Chiarmonte, director of finance bil
Publish At:2014-10-09 04:40 | Read:3277 | Comments:0 | Tags:Data loss Featured Security threats AT&T insider insider the

AT&T hit by insider breach; "change your passcode" it warns

AT&T, one of the US's biggest telecoms, has fired an insider for having thumbed through customer accounts without authorization and potentially slurping customers' taxpayer IDs, driver license numbers and more.Sources familiar with the incident said about 1,600 people were affected, according to The Register.Michael A. Chiarmonte, director of finance bil
Publish At:2014-10-09 01:30 | Read:2852 | Comments:0 | Tags:Data loss Featured Security threats AT&T insider insider the

Security incidents are up - and pricier! - but infosec budgets are dwindling

The number of security incidents is rising, as are associated costs to clean them up.Global corporate security budgets, meanwhile, seem to be hiding in the closet, just hoping it all goes away.The news of this depressing state of affairs comes courtesy of PwC's Global State of Information Security Survey 2015, carried out in conjunction with CIO and CSO maga
Publish At:2014-10-04 01:10 | Read:4207 | Comments:0 | Tags:Data loss Featured Malware Security threats Vulnerability br

Disgruntled employees are increasingly e-sabotaging businesses, FBI says

Employees with an axe to grind are increasingly sticking it to their current or former employers using e-tools such as cloud storage sites or remote access to a company's computer network, the US Federal Bureau of Investigation and Homeland Security Department said on Tuesday.Such workers are using cloud storage tools such as Dropbox to steal trade secrets o
Publish At:2014-09-25 06:20 | Read:4997 | Comments:0 | Tags:Data loss Denial of Service Featured Law & order Security th

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud