HackDig : Dig high-quality web security articles for hackers

A zero-day guide for 2020: Recent attacks and advanced preventive techniques

Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.  This article examines three recent zero-day atta
Publish At:2020-06-23 14:30 | Read:68 | Comments:0 | Tags:Exploits and vulnerabilities artificial intelligence EDR end

A Game of Chess: Entropy and Patterns in Threat Intelligence

During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast,
Publish At:2020-06-23 11:55 | Read:98 | Comments:0 | Tags:Artificial Intelligence Security Intelligence & Analytics Th

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protection of our personal data a fundamental human right. But that was then. What is shaping today’s cybersecurity?
Publish At:2020-06-18 00:31 | Read:198 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI Cloud C

We Need the Security Benefits of AI and Machine Learning Now More Than Ever

Reading Time: ~ 3 min. As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem for business owners and MSPs is that cybercriminals are not reducing their budgets apace. On the contrary, the rise in COVID-related scams has been noticeable. It’s simply no time to cut corners in
Publish At:2020-06-16 15:50 | Read:151 | Comments:0 | Tags:Managed Service Providers artificial intelligence machine le

Zimperium Announces First and Only Comprehensive Security for Chromebooks

Machine learning-based solution goes beyond detecting known malware; protects against device, network, phishing and malicious app attacks  “zIPS for Chromebooks” is the first and only comprehensive, on-device, machine learning-based security solution for Chromebooks. zIPS for Chromebooks is not a new product, but the extension of our award-winning zIPS solu
Publish At:2020-06-11 08:01 | Read:171 | Comments:0 | Tags:Chromebooks machine learning malware phishing

AI and ML in Cybersecurity: Adoption is Rising, but Confusion Remains

Reading Time: ~ 3 min. If you’ve been working in the technology space for any length of time, you’ve undoubtedly heard about the rising importance of artificial intelligence (AI) and machine learning (ML). But what can these tools really do for you? More specifically, what kinds of benefits do they offer for cybersecurity and business operations? If you’r
Publish At:2020-05-18 13:03 | Read:143 | Comments:0 | Tags:SMBs artificial intelligence machine learning

Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of
Publish At:2020-03-27 09:35 | Read:450 | Comments:0 | Tags:Artificial Intelligence Advanced Threats Artificial Intellig

Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

In recent years, remote work has become a growing trend. In 2018, however, only 3.6 percent of Americans worked entirely remotely. Due to changes in the global climate, many employers have shifted their workforces to remote work if their jobs can support it. With the sudden expansion of work-from-home and remote-work practices, chief information security off
Publish At:2020-03-25 15:51 | Read:444 | Comments:0 | Tags:Advanced Threats Identity & Access Security Intelligence & A

Russia’s FSB wanted its own IoT botnet

byDanny BradburyIf you thought the Mirai botnet was bad, what about a version under the control of Russia’s military that it could point like an electronic cannon at people it didn’t like? That’s the prospect we could face after the reported emergence of secret Russian project documents online last week.The documents, which come from hackin
Publish At:2020-03-24 09:55 | Read:530 | Comments:0 | Tags:Botnet Denial of Service Government security IoT Machine Lea

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Healthcare cybersecurity attacks are on the rise. As Protenus notes, industry data breaches increased by 48 percent between 2018 and 2019, with more than 41 million patient records compromised. Meanwhile, according to the 2019 HIMSS Cybersecurity Survey, 82 percent of hospitals said they suffered a “significant security incident” in the past 12 m
Publish At:2020-03-09 11:15 | Read:666 | Comments:0 | Tags:Healthcare Risk Management Artificial Intelligence (AI) Cybe

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The traditional threat landscape comprised of conventional IT assets is difficult enough to protect, detect and respond to, but the landscape seems to be quickly expanding beyond traditional IT. Those new domains are operational technology (OT), the internet of things (IoT) and the internet of medical things (IoMT). Devices from non-traditional IT environmen
Publish At:2020-03-04 13:39 | Read:575 | Comments:0 | Tags:Endpoint Energy & Utility Healthcare Threat Intelligence NIS

Smart speakers mistakenly eavesdrop up to 19 times a day

byDanny BradburyThat smart home speaker isn’t listening to everything you say, according to new research – but it is listening a lot more than it should. Researchers have found some speakers activating by mistake up to 19 times each day.Virtual assistants like Siri and Alexa are programmed not to listen to your conversation constantly. Instead, t
Publish At:2020-02-25 09:11 | Read:430 | Comments:0 | Tags:Amazon Apple Google Machine Learning Microsoft Privacy Alexa

Self-driving car dataset missing labels for pedestrians, cyclists

byLisa VaasA popular self-driving car dataset for training machine-learning systems – one that’s used by thousands of students to build an open-source self-driving car – contains critical errors and omissions, including missing labels for hundreds of images of bicyclists and pedestrians.Machine learning models are only as good as the data o
Publish At:2020-02-15 12:43 | Read:494 | Comments:0 | Tags:Machine Learning AI Artificial intelligence Autonomous vehic

How to Create Value With Your (Security) Data Analytics Program

I have been fascinated by data analytics for all my professional life — from my early days of using Linux command-line tools like grep, cut, sort and unique to make sense of log files and identify the chain of events that harmed my web server, to using simple Excel and pivot tables to do pretty much the same with data of all types. Now, we have much fancier
Publish At:2020-02-10 10:40 | Read:498 | Comments:0 | Tags:Security Intelligence & Analytics Access Management Analytic

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:611 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

Announce

Share high-quality web security related articles with you:)

Tools