HackDig : Dig high-quality web security articles

Was the recent Ubiquiti data breach catastrophic?

An unidentified whistleblower who was recently interviewed by KrebsOnSecurity said that Ubiquiti severely downplayed the data breach that hit the network equipment manufacturer at the end of 2020. The interview comes approximately three months after the data breach was first reported and suggests the company intentionally forgot to disclose the data breach&#
Publish At:2021-04-07 07:57 | Read:80 | Comments:0 | Tags:Mobile News News Security data breach ubiquiti

Fileless Malware Attacks Surge by 900% and Cryptominers Make a Comeback

WatchGuard report uncovers massive increases in endpoint attacks, rising encrypted malware rates, new exploits targeting IoT devices, and more.   WatchGuard Technologies, a global leader in network security and intelligence, multi-factor authentication (MFA), advanced endpoint protection, and secure Wi-Fi, today released its Internet Security Report for Q4 2
Publish At:2021-03-30 08:25 | Read:160 | Comments:0 | Tags:News b2b Cybersecurity trends ISR Q4 WatchGuard

Is USA at cyber war with the rest of the world?

About a month ago, multiple media outlets reported that hackers were very close to poisoning a water source located in Florida. The cybercriminals successfully made their way into the computer system controlling a water treatment facility located in the Sunshine State. They managed to gain full control over the plant’s computer system and start the process o
Publish At:2021-03-17 08:10 | Read:146 | Comments:0 | Tags:Mobile News News cyber attacks cyber war cyber

Unsecured Cloud Configurations Exposing Information in Thousands of Mobile Apps

Abstract When approaching the development of a mobile application, one of the key design decisions revolves around the server side aspect of the application. Specifically, storage of information relevant to the app’s usage, as well as the backend API’s allowing the app to query the server for information in real time (as opposed to static data that’s stored
Publish At:2021-03-04 14:51 | Read:396 | Comments:0 | Tags:News Android app security apps cloud iOS MAPS mobile mobile

Cybercrimes Prevention: International Cybersecurity Laws & implications

Is your business framework 100% prepared to confront the severest cybercrimes or cyber-attacks and alleviate the danger of potential data breaches? In the event that you are uncertain about your cybersecurity structure, at that point, it’s an ideal opportunity to update it. Else, you could be at risk of long fights in court that bring about heavy fines
Publish At:2021-02-18 04:19 | Read:422 | Comments:0 | Tags:Knowledge-base News cyberattack Cybercrimes Cybercrimes Prev

Gitanjali Rao, the 15-year-old scientist, awarded Time’s Kid of The Year

A 15-year-old scientist and inventor has been awarded Time magazine’s first Kid of the Year award. Despite her youth, Gitanjali Rao has to her credit several innovative creations in various fields, such as a device capable of identifying the presence of lead in drinking water -which she has named Tethys after the Greek goddess of fresh water- or an app
Publish At:2021-02-11 09:28 | Read:287 | Comments:0 | Tags:Mobile News News Technology technology women in science

Web Cache Poisoning – A Modern Methodology of Attacking Large User-Base

In this modern digital world, especially in the era of Work From Home (WFH), it is essential that the web applications we are being used on daily basis must be available to their users with quick request-response time. There are many ways to achieve this, but we are going to focus on Caching and Web Cache Poisoning. Many web applications make use of Web Serv
Publish At:2021-02-03 09:25 | Read:397 | Comments:0 | Tags:Knowledge-base News Cache attack Web Cache Poisoning Web Cac

Need of Cybersecurity as viewed by the Educational Boards of India

India desperately needs more cyber-heroes to defend its web-fronts(and backs)! As one of the major economies of the world, India has and sincerely contributed to the large scale digitalization and virtualization of its economic, financial, governance as well as administrative systems. On its way to emerge as one of the software product-making powers, India
Publish At:2021-01-25 10:55 | Read:429 | Comments:0 | Tags:News Cybersecurity Awareness cybersecurity in india need of

Will GOP retaliate against Big Tech for censuring President Trump?

Some of the most recognized brands in the tech industry, including Facebook, Twitter, Snapchat, YouTube, and Reddit, banned the United States’ sitting President from using the digital platforms. Donald Trump suddenly lost tribunes that gave him access to more than one hundred million followers. Initially, the bans were supposed to last until Joe Biden’
Publish At:2021-01-20 10:58 | Read:418 | Comments:0 | Tags:Mobile News News Social Media Facebook trump Twitter

OWASP Top 10 Vulnerabilities IoT Security: Lack of Physical Hardening

With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being part of critical infrastructure and threat actors will desire to backdoor it abusing the OWASP top 10 vulnerabilities. There are a majority of ways in which an Iot device can be compromised and e
Publish At:2021-01-19 14:31 | Read:485 | Comments:0 | Tags:Cloud Security iOS Penetration Testing IoT Security News OWA

Latest Joomla Exploit ‘CVE-2020-35616’ – Joomla ACL Security Vulnerabilities

Working as a Security Consultant, more often than not, you come across vulnerabilities that are peculiar & at the same time important to be fixed soon. Something of the sort recently happened with me, while looking for new Joomla exploit and attacks in Joomla Security. I came across a vulnerability in Joomla that would give privileges to non-superuser
Publish At:2020-12-26 16:55 | Read:658 | Comments:0 | Tags:Joomla Security News Website Security CVE-2020 Joomla joomla

Multiple government agencies hacked by Russia-backed actors

Multiple agencies in the USA have been hacked by a group of foreign-state bad actors tied to Russia. The affected government agencies include the U.S. Treasury, Commerce departments, and possibly many U.S. entities. According to a story published by Reuters, hackers have been monitoring government agencies’ internal emails. The cybercriminals have like
Publish At:2020-12-23 12:10 | Read:507 | Comments:0 | Tags:Mobile News News Security cyber attack cybersecurity governm

Was Google hacked?

Google has been hit by a massive global outage that stopped users from accessing virtually every Google service, including Gmail, YouTube, and Google Docs. Users reported an inability to sign in to Gmail; watch videos; access essential documents, and execute simple tasks on the platform. The problems started occurring in early Monday morning, and Google says
Publish At:2020-12-17 07:58 | Read:475 | Comments:0 | Tags:Mobile News News Technology Gmail Google hacking attacks You

Do you know the Impact of COVID-19 on the Security Threat Landscape?

Q3 2020 Internet Security Report sheds light on COVID-19 threat trends, growing network attacks, malware targeting U.S. SCADA systems, and more. Panda, a WatchGuard brand, announced the release of its Internet Security Report for Q3 2020. Top findings from the research reveal how COVID-19 has impacted the security threat landscape, with evidence that attacke
Publish At:2020-12-16 08:10 | Read:622 | Comments:0 | Tags:Business News Panda Security advanced cybersecurity b2b quar

A Reminder to Stay Vigilant

This year has been a challenging one for organizations that faced data breaches, intrusions and ransomware attacks at the hands of cyber criminals and nation-state attackers. Cybersecurity firm FireEye announced on Dec. 8, 2020, that an adversary targeted and gained unauthorized access to its Red Team tools — an important call to every company to rema
Publish At:2020-12-09 18:11 | Read:460 | Comments:0 | Tags:Incident Response News Threat Intelligence Cybersecurity Dat