HackDig : Dig high-quality web security articles for hackers

Latest Joomla Exploit ‘CVE-2020-35616’ – Joomla ACL Security Vulnerabilities

Working as a Security Consultant, more often than not, you come across vulnerabilities that are peculiar & at the same time important to be fixed soon. Something of the sort recently happened with me, while looking for new Joomla exploit and attacks in Joomla Security. I came across a vulnerability in Joomla that would give privileges to non-superuser
Publish At:2020-12-26 16:55 | Read:248 | Comments:0 | Tags:Joomla Security News Website Security CVE-2020 Joomla joomla

Multiple government agencies hacked by Russia-backed actors

Multiple agencies in the USA have been hacked by a group of foreign-state bad actors tied to Russia. The affected government agencies include the U.S. Treasury, Commerce departments, and possibly many U.S. entities. According to a story published by Reuters, hackers have been monitoring government agencies’ internal emails. The cybercriminals have like
Publish At:2020-12-23 12:10 | Read:234 | Comments:0 | Tags:Mobile News News Security cyber attack cybersecurity governm

Was Google hacked?

Google has been hit by a massive global outage that stopped users from accessing virtually every Google service, including Gmail, YouTube, and Google Docs. Users reported an inability to sign in to Gmail; watch videos; access essential documents, and execute simple tasks on the platform. The problems started occurring in early Monday morning, and Google says
Publish At:2020-12-17 07:58 | Read:236 | Comments:0 | Tags:Mobile News News Technology Gmail Google hacking attacks You

Do you know the Impact of COVID-19 on the Security Threat Landscape?

Q3 2020 Internet Security Report sheds light on COVID-19 threat trends, growing network attacks, malware targeting U.S. SCADA systems, and more. Panda, a WatchGuard brand, announced the release of its Internet Security Report for Q3 2020. Top findings from the research reveal how COVID-19 has impacted the security threat landscape, with evidence that attacke
Publish At:2020-12-16 08:10 | Read:266 | Comments:0 | Tags:Business News Panda Security advanced cybersecurity b2b quar

A Reminder to Stay Vigilant

This year has been a challenging one for organizations that faced data breaches, intrusions and ransomware attacks at the hands of cyber criminals and nation-state attackers. Cybersecurity firm FireEye announced on Dec. 8, 2020, that an adversary targeted and gained unauthorized access to its Red Team tools — an important call to every company to rema
Publish At:2020-12-09 18:11 | Read:152 | Comments:0 | Tags:Incident Response News Threat Intelligence Cybersecurity Dat

COVID-19: the impact of the pandemic in three IT areas

The impact of the COVID-19 pandemic on society has led to a digital transition period with organizations and businesses having to rapidly rewrite their plans for the immediate future. As companies set out to address these new scenarios, the need for expert technical support has become increasingly evident, and vital in order for investment and implementation
Publish At:2020-12-02 09:10 | Read:218 | Comments:0 | Tags:Adaptive Defense Business News b2b covid-19 MSP WatchGuard

Cybersecurity predictions for 2021: automation set to drive spear phishing campaigns

In August, a cybersecurity webinar for US federal agents set out the leading security trends in their field. The event was attended by leading experts and cybersecurity directors from organizations such as the public/private partnership ACT-IAC and the US space agency NASA. The latter’s CIO, Mike Witt, explained, “We’ve got to get away from the mind-set of ‘
Publish At:2020-11-26 08:52 | Read:285 | Comments:0 | Tags:Business News Panda Security b2b cybersecurity predictions W

Webinar Cybersecurity CISO: Attack and Defend Active Directory Security Vulnerabilities

ABOUT THE WEBINAR Microsoft Active Directory (AD) offers directory services for corporations that make use of Windows Server. Based at the Lightweight Directory Access Protocol (LDAP), AD offers quite a number of functions of the directory, which includes centralized area control and Identity and Access Management (IAM). AD is much less the same old IAM a
Publish At:2020-11-20 07:37 | Read:255 | Comments:0 | Tags:News security cyber cybersecurity

Zimperium Names Proven Finance and Operations Leader, Brian Szeto, Chief Financial Officer

Brian Szeto has joined Zimperium as our Chief Financial Officer, where he will play a strategic role in accelerating our industry-leading growth and expansion by leading all finance, accounting, real estate, human resources, and information technology efforts. “Brian adds so much to the Zimperium team,” said Shridhar Mittal, our chief executive officer. “He
Publish At:2020-11-19 11:33 | Read:356 | Comments:0 | Tags:News ZIMPERIUM

What is The Clean Network?

Multiple wireless carriers in the USA have successfully deployed 5G networks across the country. The newly launched iPhone 12 devices and multiple 5G capable Android devices are taking advantage of the new technology’s fast speeds. Even though the new cellular standards and equipment were introduced just a year ago, 5G compatible devices are slowly get
Publish At:2020-11-17 10:22 | Read:317 | Comments:0 | Tags:Mobile News Mobile Security News 5g technology

We Are Proud to Announce ISO Certifications

The danger of the Web is that you can go from idea to public announcement in under ten minutes. These words from some well-known mind though being true but are contrasting to what we are feeling right now.  SecureLayer7 proudly announces that we are now Certified for ISO 9001:2015 and 27001:2013!  Since we are being so proud of it, you might want
Publish At:2020-11-07 15:24 | Read:412 | Comments:0 | Tags:News SecureLayer7 Services Enhancing the Information Securit

Are your Security Awareness Programs perfect?

Today the biggest asset for any organization is their data & as we move towards a more cyber-world, it keeps becoming more & more important. But as much as data is a resource, it is always under threat of various cybercrimes. In the year 2005 alone, over 136 data breaches were reported & over 4500 data breaches have been recognized since then.&nb
Publish At:2020-10-30 04:36 | Read:567 | Comments:0 | Tags:News security

Numerous points of entry lead to multi-million euro penalties for data security breaches.

Data security breaches are now among the most common serious incidents affecting businesses. In this respect, 2019 was a bad year for companies. It was a year that saw some of the highest penalties imposed for violating data protection regulations, with examples such as the 50 million euro fine on Google LLC for non-compliance with GDPR transparency rules an
Publish At:2020-10-29 09:40 | Read:378 | Comments:0 | Tags:Adaptive Defense Business News b2b data breach data control

Measures to implement against critical vulnerabilities: Zerologon the Windows Netlogon security hole

Zerologon is the latest critical vulnerability detected in the Windows Server OS affecting all versions from 2008 up to the latest available from Microsoft. This vulnerability has a severity rating of 10.0, and there are already PoCs that can easily exploit the flaw. Get all the information you need about recent critical and serious vulnerabilities for which
Publish At:2020-10-16 06:09 | Read:419 | Comments:0 | Tags:Business News b2b patch management vulnerabilities Zerologon

Zimperium is Honored to Protect U.S. Department of Defense Mobile Devices

As you may have seen in the news, the U.S. Department of Defense (DoD), through its Defense Information Systems Agency (DISA) and Defense Innovation Unit (DIU), selected Zimperium to deliver comprehensive Mobile Endpoint Protection (MEP) to service members around the world. Our mobile threat defense (MTD) solutions will protect DoD mobile endpoints against
Publish At:2020-10-14 09:44 | Read:533 | Comments:0 | Tags:Mobile Security Mobile Threat Defense News Department of Def

Tools

Tag Cloud