HackDig : Dig high-quality web security articles

Wyze home cameras temporarily show other people's security feeds

A mishap has resulted in security feeds and camera logs from home cameras being temporarily visible online. Users of Wyze, makers of smart products and home cameras, fell victim to this bizarre incident sometime around September 8. One of the first posts about this appeared on Reddit, where a user highlighted that they were “seeing someone else’s
Publish At:2023-09-11 22:07 | Read:101665 | Comments:0 | Tags:Personal home camera network security feed room house smart

Smart lightbulb and app vulnerability puts your Wi-Fi password at risk

New research highlights another potential danger from IoT devices, with a popular make of smart light bulbs placing your Wi-Fi network password at risk. Researchers from the University of London and Universita di Catania produced a paper explaining the dangers of common IoT products. In this case, how smart bulbs can be compromised to gain access to your hom
Publish At:2023-08-25 22:06 | Read:324589 | Comments:0 | Tags:Business business home personal router wi-fi wireless networ

Several hospitals still counting the cost of widespread ransomware attack

The 16 hospitals struck down by ransomware last week are still dealing with the fallout from the attack. The healthcare facilities located in Connecticut, Pennsylvania, Rhode island, and California had the ransomware attack confirmed by the FBI. Issues started to emerge last Thursday with patients diverted to other locations and some operations put on hold.
Publish At:2023-08-11 22:06 | Read:384515 | Comments:0 | Tags:News hospital healthcare ransomware hijack network compromis

"TootRoot" Mastodon vulnerabilities fixed: Admins, patch now!

One of Twitter’s big rivals, Mastodon, recently finished fixing four issues which (in the worst case) allowed for the creation of files on the instance’s server. Mastodon, whose main selling point is lots of separate communities living on different servers yet still able to communicate, was notified of the flaws by auditors from a penet
Publish At:2023-07-11 22:04 | Read:586989 | Comments:0 | Tags:Personal tootroot mastodon server patch update CVE flaw vuln

YouTube is testing ad blocker detection

YouTube is dipping a toe into the muddy waters of ad-blocker blocking, with ad-blocker using Redditors complaining about a popup that warns "Ad blockers are not allowed on YouTube," when they visit the site. (Image source: Reddit user Sazk100) The popup message explains that "Ads allow YouTube to stay free for billions of users worldwide," and in
Publish At:2023-05-12 22:02 | Read:342287 | Comments:0 | Tags:News Personal youtube ad advert network ad industry block bl

Malware authors join forces and target organisations with Domino Backdoor

There’s a new ransomware gang in town, stitched together from members of well known threat creators to push a new kind of malware focused on punishing unwary organisations. The malware family, called “Domino”, is the brainchild of FIN7 and ex-Conti ransomware members. Domino has been seen in attacks since at least February 2023 accordi
Publish At:2023-04-19 22:01 | Read:440308 | Comments:0 | Tags:News domino loader backdoor malware ransomware emotet networ

X-Force Identifies Vulnerability in IoT Platform

The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion a
Publish At:2023-04-05 15:10 | Read:403034 | Comments:0 | Tags:Application Security Endpoint Network Security Services Thre

LockBit ransomware attacks Essendant

The LockBit ransomware group is claiming responsibility for taking down a US-based distributor of office products called Essendant. This attack, which is said to have begun on or around March 6, created severe ramifications for the organisation, disrupting freight carrier pickups, online orders, and access to customer support. As noted by Bleeping Computer,
Publish At:2023-03-17 20:44 | Read:680173 | Comments:0 | Tags:News Ransomware lockbit ransomware essendant data encrypt ra

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by var
Publish At:2023-03-03 19:39 | Read:486992 | Comments:0 | Tags:Cloud Security Network Cloud Applications Cloud Computing Cy

How to work from home securely, the NSA way

People working remotely is no longer unusual, so the National Security Agency (NSA) has produced a short Best Practices PDF document detailing how remote workers can keep themselves safe from harm. In fact, the guide can also be applied to people using computers at home generally and is written in a way that's easy to understand. Back to basics The NSA's thr
Publish At:2023-02-27 22:17 | Read:609973 | Comments:0 | Tags:News network home secure router NSA social engineering socia

HardBit ransomware tailors ransom to fit your cyber insurance payout

Ransomware authors are wading into the cybersecurity insurance debate in a somewhat peculiar way. Specifically: urging victims to disclose details of their insurance contract, in order to tailor a ransom which will be beneficial to the company under attack. HardBit 2.0: dismantling a device piece by piece The ransomware, called HardBit 2.0, has been in circu
Publish At:2023-02-22 22:16 | Read:333510 | Comments:0 | Tags:News hardbit ransomware infection insurance cyber negotiatio

Mortal Kombat ransomware forms tag team with crypto-stealing malware

An “unidentified actor” is making use of these two malicious files to cause combo-laden mayhem on desktops around the world, according to new research from Talos. The tag-team campaign serves up ransomware known as Mortal Kombat, which borrows the name made famous by the video game, and Laplas Clipper malware, a clipboard stealer. Depending on th
Publish At:2023-02-17 22:17 | Read:717725 | Comments:0 | Tags:News mortal kombat ransomware laplas clipper cryptocurrency

Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space

View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed to the development of the space industry. Despite this growth, there has also been an expansion of the cyberattack surface of space systems. Attacks are becoming more and more
Publish At:2023-02-16 23:33 | Read:393120 | Comments:0 | Tags:Network Cybersecurity satellites security cyber cybersecurit

Contain Breaches and Gain Visibility With Microsegmentation

Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have especially manifested in more significant security threats to expanding IT attack surfaces.  Breach containment is essential, and zero
Publish At:2023-02-01 11:39 | Read:774146 | Comments:0 | Tags:Endpoint Risk Management Zero Trust Application Security Clo

Beware of What Is Lurking in the Shadows of Your IT

This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections. An example of a threat vector that can bypass security protections is “shadow IT” and it is one that organizations mus
Publish At:2022-12-21 17:25 | Read:356700 | Comments:0 | Tags:Identity & Access Incident Response Network Security Service

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud