HackDig : Dig high-quality web security articles for hacker

Why So Many Top Hackers Hail from Russia

Conventional wisdom says one reason so many hackers seem to hail from Russia and parts of the former Soviet Union is that these countries have traditionally placed a much greater emphasis than educational institutions in the West on teaching information technology in middle and high schools, and yet they lack a Silicon Valley-like pipeline to help talented I
Publish At:2017-06-22 21:05 | Read:2979 | Comments:0 | Tags:Other Alan Paller Frost & Sullivan informatics ISACA ISC2 mi

Microsoft patches two critical remote code execution (RCE) flaws that have been exploited in attacks

Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have been exploited in attacks. Microsoft released June Patch Tuesday updates that address more than 90 vulnerabilities, including two critical remote code execution (RCE) vulnerabilities that have been exploited in attacks. The first vulner
Publish At:2017-06-14 02:05 | Read:2338 | Comments:0 | Tags:Breaking News Hacking Uncategorized critical remote code exe

Don’t Wait for the Next WannaCry — Update Your SMB Protocol Before It’s Too Late

Much has been written about WannaCry, and the security community has learned countless valuable lessons from the unprecedented ransomware attack. One thing that is seldom mentioned, however, is how to protect your infrastructure against future Server Message Block (SMB) exploits. Removing the Insecure SMB Protocol Microsoft has three different versions of
Publish At:2017-06-09 10:30 | Read:3202 | Comments:0 | Tags:Network Exploit Infrastructure Protection Microsoft Network

NSA Exploit EternalBlue is becoming even common in hacking tools and malware

Security Experts are observing a significant increase in the number of malware and hacking tools leveraging the ETERNALBLUE NSA exploit. ETERNALBLUE is the alleged NSA exploit that made the headlines with DOUBLEPULSAR in the WannaCry attack. ETERNALBLUE targets the SMBv1 protocol and is has become widely adopted in the community of malware developers. Invest
Publish At:2017-06-04 02:20 | Read:2762 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime ETERNAL

You can take Shadow Brokers Zero Day Exploit Subscriptions for $21,000 per month

Shadow Brokers is going to launch a monthly subscription model for its data dumps, 0-Day Exploit Subscriptions goes for $21,000 per month. A couple of weeks ago, while security experts were debating about WannaCry ransomware and the NSA exploits it used, the Shadow Brokers group revealed its plan to sell off new exploits every month starting from June. Shado
Publish At:2017-05-30 23:35 | Read:2291 | Comments:0 | Tags:Uncategorized Cybercrime Equation group Hacking malware Micr

Flashpoint experts believe WannaCry authors speak Chinese after a linguistic analysis

Security experts at threat intelligence firm Flashpoint conducted a linguistic analysis of dozens of ransom notes displayed by the WannaCry ransomware. Malware researchers at threat intelligence firm Flashpoint conducted a linguistic analysis of 28 ransom notes displayed by the WannaCry ransomware. Flashpoint analyzed 28 WannaCry ransom notes written in vari
Publish At:2017-05-26 09:05 | Read:3160 | Comments:0 | Tags:APT Breaking News Hacking China Cybercrime linguistic analys

Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications

Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from a variety of sources, including Exchange Online, SharePoint Online and Azure Directory, how can Office 365 administrators correlate all this valuable data wit
Publish At:2017-05-26 08:10 | Read:3599 | Comments:0 | Tags:Cloud Security Data Protection Identity & Access Security In

Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry?

Two weeks into the WannaCry aftermath, response teams are getting back to normal, organizations are re-evaluating their infrastructures, and even the bitcoin payments the fraudsters were collecting have almost stopped trickling in. It’s time now to look into the data to find clues about what made WannaCry spread so rapidly and with such a wide scope.
Publish At:2017-05-25 13:35 | Read:4392 | Comments:0 | Tags:Advanced Threats Incident Response Threat Intelligence IBM X

Medical Devices infected by WannaCry Ransomware in US hospitals

According to Forbes, the dreaded WannaCry ransomware has infected medical devices in at least two hospitals in the United States. WannaCry infected 200,000 computers across 150 countries in a matter of hours last week, it took advantage of a tool named “Eternal Blue”, originally created by the NSA, which exploited a vulnerability present inside the earlier v
Publish At:2017-05-21 18:30 | Read:2446 | Comments:0 | Tags:Breaking News Malware critical infrastructure Hacking health

WannaCry – Important lessons from the first NSA-powered ransomware cyberattack

Last Friday, a weaponized version of an NSA exploit was used to infect over two hundred thousand computers in over 150 countries with the WannaCry ransomware. In addition to government ministries and transportation infrastructure, the British National Health Service (NHS) was crippled, disrupting treatment and care for thousands of patients, and putting coun
Publish At:2017-05-16 09:30 | Read:3073 | Comments:0 | Tags:APT Breaking News Cyber Crime Hacking Intelligence critical

Enterprise Mobile Security on Microsoft Azure

Zimperium now integrates with Microsoft Azure to detect and thwart advanced mobile attacks. Our mobile threat defense (MTD) platform easily integrates directly with Microsoft Azure to give enterprise customers all of the benefits of Zimperium’s award-winning platform in the Azure Cloud. Zimperium on Azure delivers real-time, on-device threat detection and re
Publish At:2017-05-15 17:15 | Read:2711 | Comments:0 | Tags:Mobile security Mobile Threat Defense Azure Microsoft

Experts at RedSocks analyzed the massive WannaCry Ransomware attack

Currently we are seeing a large scale WannaCry ransomware outbreak. This ransomware outbreak is more devastating than others because it spreads laterally. Enjoy the RedSocks ‘s analysis. Who does it affect: Any Windows computer without Windows Patch MS17-010. What to do: Apply patch MS17-010 immediately. MS17-010 The key factor in the ‘success’ of this
Publish At:2017-05-15 15:05 | Read:7311 | Comments:0 | Tags:Breaking News Cyber Crime Malware critical infrastructure Cy

Cybersecurity Virtualization Expert Ian Pratt Explains WannaCry Exploit (Video)

Ian Pratt, co-founder of Bromium and a virtualization expert was interviewed by Sky News. The video clip below shows how the malware arrived and how it deployed. This is the first of what will be many likely exploits in the months to come. WannaCry is likely the first of many global cybersecurity events that will put our collective economies at risk. From
Publish At:2017-05-15 01:25 | Read:2884 | Comments:0 | Tags:Breaking News cybersecurity ian pratt infosec interview micr

We’re gonna need a bigger boat....

By Brad HegratA few weeks ago back in mid-March (2017), Microsoft issued a security bulletin (MS17-010) and patch for a vulnerability that was yet to be publicly disclosed or referenced. According to the bulletin, “the most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Se
Publish At:2017-05-13 22:25 | Read:2933 | Comments:0 | Tags:cybersecurity ioactive malware malware detection microsoft M

Microsoft Issues WanaCrypt Patch for Windows 8, XP

Microsoft Corp. today took the unusual step of issuing security updates to address flaws in older, unsupported versions of Windows — including Windows XP and Windows 8. The move is a bid to slow the spread of the WanaCrypt ransomware strain that infected tens of thousands of Windows computers virtually overnight this week. A map tracking the global spr
Publish At:2017-05-13 16:15 | Read:2465 | Comments:0 | Tags:Other microsoft Phillip Misner Wana Decryptor Wanna Decrypto


Share high-quality web security related articles with you:)


Tag Cloud