HackDig : Dig high-quality web security articles for hackers

Cybercrimes Prevention: International Cybersecurity Laws & implications

Is your business framework 100% prepared to confront the severest cybercrimes or cyber-attacks and alleviate the danger of potential data breaches? In the event that you are uncertain about your cybersecurity structure, at that point, it’s an ideal opportunity to update it. Else, you could be at risk of long fights in court that bring about heavy fines
Publish At:2021-02-18 04:19 | Read:184 | Comments:0 | Tags:Knowledge-base News cyberattack Cybercrimes Cybercrimes Prev

Gitanjali Rao, the 15-year-old scientist, awarded Time’s Kid of The Year

A 15-year-old scientist and inventor has been awarded Time magazine’s first Kid of the Year award. Despite her youth, Gitanjali Rao has to her credit several innovative creations in various fields, such as a device capable of identifying the presence of lead in drinking water -which she has named Tethys after the Greek goddess of fresh water- or an app
Publish At:2021-02-11 09:28 | Read:122 | Comments:0 | Tags:Mobile News News Technology technology women in science

Web Cache Poisoning – A Modern Methodology of Attacking Large User-Base

In this modern digital world, especially in the era of Work From Home (WFH), it is essential that the web applications we are being used on daily basis must be available to their users with quick request-response time. There are many ways to achieve this, but we are going to focus on Caching and Web Cache Poisoning. Many web applications make use of Web Serv
Publish At:2021-02-03 09:25 | Read:157 | Comments:0 | Tags:Knowledge-base News Cache attack Web Cache Poisoning Web Cac

Need of Cybersecurity as viewed by the Educational Boards of India

India desperately needs more cyber-heroes to defend its web-fronts(and backs)! As one of the major economies of the world, India has and sincerely contributed to the large scale digitalization and virtualization of its economic, financial, governance as well as administrative systems. On its way to emerge as one of the software product-making powers, India
Publish At:2021-01-25 10:55 | Read:236 | Comments:0 | Tags:News Cybersecurity Awareness cybersecurity in india need of

Will GOP retaliate against Big Tech for censuring President Trump?

Some of the most recognized brands in the tech industry, including Facebook, Twitter, Snapchat, YouTube, and Reddit, banned the United States’ sitting President from using the digital platforms. Donald Trump suddenly lost tribunes that gave him access to more than one hundred million followers. Initially, the bans were supposed to last until Joe Biden’
Publish At:2021-01-20 10:58 | Read:197 | Comments:0 | Tags:Mobile News News Social Media Facebook trump Twitter

OWASP Top 10 Vulnerabilities IoT Security: Lack of Physical Hardening

With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being part of critical infrastructure and threat actors will desire to backdoor it abusing the OWASP top 10 vulnerabilities. There are a majority of ways in which an Iot device can be compromised and e
Publish At:2021-01-19 14:31 | Read:261 | Comments:0 | Tags:Cloud Security iOS Penetration Testing IoT Security News OWA

Latest Joomla Exploit ‘CVE-2020-35616’ – Joomla ACL Security Vulnerabilities

Working as a Security Consultant, more often than not, you come across vulnerabilities that are peculiar & at the same time important to be fixed soon. Something of the sort recently happened with me, while looking for new Joomla exploit and attacks in Joomla Security. I came across a vulnerability in Joomla that would give privileges to non-superuser
Publish At:2020-12-26 16:55 | Read:412 | Comments:0 | Tags:Joomla Security News Website Security CVE-2020 Joomla joomla

Multiple government agencies hacked by Russia-backed actors

Multiple agencies in the USA have been hacked by a group of foreign-state bad actors tied to Russia. The affected government agencies include the U.S. Treasury, Commerce departments, and possibly many U.S. entities. According to a story published by Reuters, hackers have been monitoring government agencies’ internal emails. The cybercriminals have like
Publish At:2020-12-23 12:10 | Read:353 | Comments:0 | Tags:Mobile News News Security cyber attack cybersecurity governm

Was Google hacked?

Google has been hit by a massive global outage that stopped users from accessing virtually every Google service, including Gmail, YouTube, and Google Docs. Users reported an inability to sign in to Gmail; watch videos; access essential documents, and execute simple tasks on the platform. The problems started occurring in early Monday morning, and Google says
Publish At:2020-12-17 07:58 | Read:391 | Comments:0 | Tags:Mobile News News Technology Gmail Google hacking attacks You

Do you know the Impact of COVID-19 on the Security Threat Landscape?

Q3 2020 Internet Security Report sheds light on COVID-19 threat trends, growing network attacks, malware targeting U.S. SCADA systems, and more. Panda, a WatchGuard brand, announced the release of its Internet Security Report for Q3 2020. Top findings from the research reveal how COVID-19 has impacted the security threat landscape, with evidence that attacke
Publish At:2020-12-16 08:10 | Read:413 | Comments:0 | Tags:Business News Panda Security advanced cybersecurity b2b quar

A Reminder to Stay Vigilant

This year has been a challenging one for organizations that faced data breaches, intrusions and ransomware attacks at the hands of cyber criminals and nation-state attackers. Cybersecurity firm FireEye announced on Dec. 8, 2020, that an adversary targeted and gained unauthorized access to its Red Team tools — an important call to every company to rema
Publish At:2020-12-09 18:11 | Read:294 | Comments:0 | Tags:Incident Response News Threat Intelligence Cybersecurity Dat

COVID-19: the impact of the pandemic in three IT areas

The impact of the COVID-19 pandemic on society has led to a digital transition period with organizations and businesses having to rapidly rewrite their plans for the immediate future. As companies set out to address these new scenarios, the need for expert technical support has become increasingly evident, and vital in order for investment and implementation
Publish At:2020-12-02 09:10 | Read:354 | Comments:0 | Tags:Adaptive Defense Business News b2b covid-19 MSP WatchGuard

Cybersecurity predictions for 2021: automation set to drive spear phishing campaigns

In August, a cybersecurity webinar for US federal agents set out the leading security trends in their field. The event was attended by leading experts and cybersecurity directors from organizations such as the public/private partnership ACT-IAC and the US space agency NASA. The latter’s CIO, Mike Witt, explained, “We’ve got to get away from the mind-set of ‘
Publish At:2020-11-26 08:52 | Read:454 | Comments:0 | Tags:Business News Panda Security b2b cybersecurity predictions W

Webinar Cybersecurity CISO: Attack and Defend Active Directory Security Vulnerabilities

ABOUT THE WEBINAR Microsoft Active Directory (AD) offers directory services for corporations that make use of Windows Server. Based at the Lightweight Directory Access Protocol (LDAP), AD offers quite a number of functions of the directory, which includes centralized area control and Identity and Access Management (IAM). AD is much less the same old IAM a
Publish At:2020-11-20 07:37 | Read:391 | Comments:0 | Tags:News security cyber cybersecurity

Zimperium Names Proven Finance and Operations Leader, Brian Szeto, Chief Financial Officer

Brian Szeto has joined Zimperium as our Chief Financial Officer, where he will play a strategic role in accelerating our industry-leading growth and expansion by leading all finance, accounting, real estate, human resources, and information technology efforts. “Brian adds so much to the Zimperium team,” said Shridhar Mittal, our chief executive officer. “He
Publish At:2020-11-19 11:33 | Read:522 | Comments:0 | Tags:News ZIMPERIUM

Tools

Tag Cloud