HackDig : Dig high-quality web security articles for hackers

Legacy Systems: Seven Things to Know When Sunsetting

Nothing lasts forever. That’s true for cars, devices, even a favorite sweatshirt or pair of jeans. But it is especially true for information technology (IT).  Legacy IT systems stick around in business settings for three main reasons: organizations don’t have the budget to upgrade, teams need to be able to access critical legacy application
Publish At:2020-08-13 09:08 | Read:91 | Comments:0 | Tags:Application Security Network Software & App Vulnerabilities

6 Ransomware Trends You Should Watch for in 2020

A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses more than $75 billion a year. Part of that financial impact results from downtime costs. Govtech also revealed that businesses lost an average of $8,500 per hour as the result of
Publish At:2020-08-04 07:43 | Read:101 | Comments:0 | Tags:Network Threat Research Advanced Malware Cryptoware Enterpri

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:86 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

Securing Travel and Transportation Operations

Transportation networks are foundational to our modern way of life. The current restrictions on global movement and the corresponding reduction in demand for travel and transportation services, while profound, are temporary. Forecasting future demand and capacity requirements is nearly impossible. But, the travel and transportation industries are part of the
Publish At:2020-07-22 10:51 | Read:137 | Comments:0 | Tags:Incident Response Network Security Services Advanced Threat

Why Cyber Ranges Are Effective To Train Your Teams

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that test multiple dimensions and stakeholders within diverse environments. Cybersecurity teams can use cyber ranges to practice defending against simulated threats in immersive trainin
Publish At:2020-07-20 08:40 | Read:181 | Comments:0 | Tags:Advanced Threats Incident Response Cloud Security Cybersecur

Focusing on the Fundamentals of Network Security

IBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020.  Focus on Security Fundamentals   One of the key fundamental approaches for security is to ensure your security team can identify, investigate and respond to threats. We recommend mining network
Publish At:2020-07-15 12:51 | Read:182 | Comments:0 | Tags:Network App Security Corporate Network Security Network Secu

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology (IT) teams to
Publish At:2020-07-14 09:05 | Read:169 | Comments:0 | Tags:Incident Response Network Security Services Home Network Sec

Updating Legacy Systems Amid Growing Cybersecurity Concerns

Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure is a key priority.  Keeping legacy systems up to date in a world of increasing cyber threats has been a concern the past few years, but it has become more prevalent as the pandem
Publish At:2020-07-09 10:08 | Read:261 | Comments:0 | Tags:Application Security Network Application Vulnerability Cyber

What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

The current pandemic has shown us what humanity stands for: kindness, care, sharing, giving and all the great values that we have as a global community, especially in hard times. In these times of need, there are multiple initiatives that are being driven by individuals and organizations alike asking for help — both in kind and cash. And, as one would expect
Publish At:2020-05-24 06:18 | Read:274 | Comments:0 | Tags:Network Threat Research Cyberattacks Cybercriminals Identity

Bad Actors Infiltrated New York’s State Government Computer Network

Officials revealed that malicious actors had succeeded in infiltrating the computer network serving New York’s state government.According to the Wall Street Journal (WSJ), officials revealed on April 13 that New York’s Office of Information Technology had discovered the security incident in late-January 2020. Its analysis unveiled that those indi
Publish At:2020-04-15 11:36 | Read:568 | Comments:0 | Tags:Government Latest Security News attacker Network New York

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench in the machine by conn
Publish At:2020-03-18 13:10 | Read:4247 | Comments:0 | Tags:CISO Identity & Access Mobile Security Network BYOD Bring-Yo

What Is a DDoS Attack?

After 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called Trin00 attacked a computer at the University of Minnesota, according to MIT Technology Review. The infect
Publish At:2020-02-15 17:18 | Read:629 | Comments:0 | Tags:Network Security Intelligence & Analytics Application Securi

As Internet turns 50, more risks and possibilities emerge

This op-ed originally appeared in the San Francisco Chronicle on October 28, 2019. We occupy a richly-connected world. On the Internet, we collapse distance and shift time. But this Internet that delivers mail, connects us with friends, lets us work anywhere, and shop from the palm of the hand, is a mere 50 years old, slightly younger than Jennifer Anisto
Publish At:2019-11-11 23:20 | Read:756 | Comments:0 | Tags:Awareness arpanet dns domain domains history of the internet

Getting an Earful: Convincing Employees to Care About Network Security

Employees remain the biggest source of corporate cyber risk. According to the “IBM X-Force 2016 Cyber Security Intelligence Index,” staff members are responsible for 60 percent of all digital attacks endured by enterprises. In most cases, there’s no malicious intent. Employees may subvert network security by opening infected email attachmen
Publish At:2017-09-29 11:51 | Read:3927 | Comments:0 | Tags:CISO Network Chief Information Security Officer (CISO) Educa

[SANS ISC] The easy way to analyze huge amounts of PCAP data

I published the following diary on isc.sans.org: “The easy way to analyze huge amounts of PCAP data“. When you are investigating a security incident, there are chances that, at a certain point, you will have to dive into network traffic analysis. If you’re lucky, you’ll have access to a network capture. Approximatively one year ago, I wrote a qui
Publish At:2017-09-28 08:00 | Read:3395 | Comments:0 | Tags:Docker SANS Internet Storm Center Security Moloch network pc

Tools

Tag Cloud