HackDig : Dig high-quality web security articles for hackers

Data Breach Protection Must Include Physical Security

If most of your business’ data and workloads are handled on public clouds, it can be easy to forget about the onsite servers. With office buildings empty, employees may assume the servers are protected by the same physical security as the rest of the facility. However, physical security has its own considerations, and paying careful attention to them
Publish At:2020-09-08 13:55 | Read:189 | Comments:0 | Tags:Network Security Intelligence & Analytics Security Services

Under Attack: How Threat Actors are Exploiting SOCKS Proxies

From the basic building blocks of the internet to cryptocurrency mining on a supercomputer, SOCKS sits at the core of computing. A SOCKS proxy can be used to improve network security in an enterprise, but can also be exploited by cybercriminals for nefarious reasons. Take a look at how SOCKS proxies have been manipulated recently by threat actors. What is
Publish At:2020-09-03 16:34 | Read:200 | Comments:0 | Tags:Advanced Threats Network Security Intelligence & Analytics C

Leverage Automation Successfully as Part of a Broader SOAR Strategy

In a previous article, we explored common misconceptions about automation and the realities of using automation to improve security. This article discusses automation best practices as part of an overall Security Orchestration, Automation and Response (SOAR) strategy. Being fully aware of the pitfalls of automation helps frame best practices and provide gre
Publish At:2020-08-26 13:16 | Read:300 | Comments:0 | Tags:Application Security Mobile Security Network SOAR Automation

Legacy Systems: Seven Things to Know When Sunsetting

Nothing lasts forever. That’s true for cars, devices, even a favorite sweatshirt or pair of jeans. But it is especially true for information technology (IT).  Legacy IT systems stick around in business settings for three main reasons: organizations don’t have the budget to upgrade, teams need to be able to access critical legacy application
Publish At:2020-08-13 09:08 | Read:373 | Comments:0 | Tags:Application Security Network Software & App Vulnerabilities

6 Ransomware Trends You Should Watch for in 2020

A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses more than $75 billion a year. Part of that financial impact results from downtime costs. Govtech also revealed that businesses lost an average of $8,500 per hour as the result of
Publish At:2020-08-04 07:43 | Read:237 | Comments:0 | Tags:Network Threat Research Advanced Malware Cryptoware Enterpri

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:297 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

Securing Travel and Transportation Operations

Transportation networks are foundational to our modern way of life. The current restrictions on global movement and the corresponding reduction in demand for travel and transportation services, while profound, are temporary. Forecasting future demand and capacity requirements is nearly impossible. But, the travel and transportation industries are part of the
Publish At:2020-07-22 10:51 | Read:341 | Comments:0 | Tags:Incident Response Network Security Services Advanced Threat

Why Cyber Ranges Are Effective To Train Your Teams

Cyber ranges may be one of the most effective ways to train IT professionals in defending against cyber attacks. The virtual environments deliver simulated real-world attacks that test multiple dimensions and stakeholders within diverse environments. Cybersecurity teams can use cyber ranges to practice defending against simulated threats in immersive trainin
Publish At:2020-07-20 08:40 | Read:318 | Comments:0 | Tags:Advanced Threats Incident Response Cloud Security Cybersecur

Focusing on the Fundamentals of Network Security

IBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020.  Focus on Security Fundamentals   One of the key fundamental approaches for security is to ensure your security team can identify, investigate and respond to threats. We recommend mining network
Publish At:2020-07-15 12:51 | Read:343 | Comments:0 | Tags:Network App Security Corporate Network Security Network Secu

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology (IT) teams to
Publish At:2020-07-14 09:05 | Read:322 | Comments:0 | Tags:Incident Response Network Security Services Home Network Sec

Updating Legacy Systems Amid Growing Cybersecurity Concerns

Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure is a key priority.  Keeping legacy systems up to date in a world of increasing cyber threats has been a concern the past few years, but it has become more prevalent as the pandem
Publish At:2020-07-09 10:08 | Read:509 | Comments:0 | Tags:Application Security Network Application Vulnerability Cyber

What the Data Is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic

The current pandemic has shown us what humanity stands for: kindness, care, sharing, giving and all the great values that we have as a global community, especially in hard times. In these times of need, there are multiple initiatives that are being driven by individuals and organizations alike asking for help — both in kind and cash. And, as one would expect
Publish At:2020-05-24 06:18 | Read:410 | Comments:0 | Tags:Network Threat Research Cyberattacks Cybercriminals Identity

Bad Actors Infiltrated New York’s State Government Computer Network

Officials revealed that malicious actors had succeeded in infiltrating the computer network serving New York’s state government.According to the Wall Street Journal (WSJ), officials revealed on April 13 that New York’s Office of Information Technology had discovered the security incident in late-January 2020. Its analysis unveiled that those indi
Publish At:2020-04-15 11:36 | Read:773 | Comments:0 | Tags:Government Latest Security News attacker Network New York

How We Learned to Stop Worrying and Embrace Remote Work

The industry is in the midst of a transformation. In this case, it isn’t the omnipresent digital transformation but rather a sudden tectonic shift towards remote work. For many organizations built on the classic, communal office space, this can seem daunting. Many employees have started to work from home, and some are throwing a wrench in the machine by conn
Publish At:2020-03-18 13:10 | Read:5064 | Comments:0 | Tags:CISO Identity & Access Mobile Security Network BYOD Bring-Yo

What Is a DDoS Attack?

After 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called Trin00 attacked a computer at the University of Minnesota, according to MIT Technology Review. The infect
Publish At:2020-02-15 17:18 | Read:789 | Comments:0 | Tags:Network Security Intelligence & Analytics Application Securi

Tools

Tag Cloud