HackDig : Dig high-quality web security articles for hacker

The Edge is Near. Are You Ready?

Outpacing Your Security Capacity With Digital Innovation is a Formula for Disaster Digital transformation has largely been focused on expanding the network through the creation and integration of new edge computing environments. Internal projects, such as the virtualization of the data center, have now turned into the cloud edge through the addition of
Publish At:2020-01-16 12:00 | Read:229 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

New Bill Would Prohibit Intelligence Sharing With Countries That Use Huawei

A bill introduced this week by Senator Tom Cotton (R-Arkansas) would ban the sharing of intelligence with countries that use Huawei technologies in their fifth generation (5G) networks.The United States has long expressed concerns that Huawei equipment may contain backdoors that would allow for the Chinese government to conduct espionage operations, and some
Publish At:2020-01-10 22:15 | Read:338 | Comments:0 | Tags:Mobile Security Network Security NEWS & INDUSTRY Wireles

Network Traffic Analysis Provides Visibility, Detection and Investigation Capabilities

More and more, organizations are finding they do not have the levels of automation and visibility needed to prevent, detect and respond to modern threats. These threats are harder than ever to detect, and constantly evolving to take advantage of gaps in security postures that have been widened by increasingly disparate architectures. For example, traditional
Publish At:2020-01-07 10:15 | Read:121 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Cisco DCNM Users Warned of Serious Vulnerabilities

Cisco on Thursday informed customers that it has released software updates for its Data Center Network Manager (DCNM) product to address several critical and high-severity vulnerabilities.All of the serious vulnerabilities patched in DCNM were reported to Cisco by researcher Steven Seeley of Source Incite. The flaws were reported by Seeley through Trend Micr
Publish At:2020-01-02 22:15 | Read:171 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Vulnerabilities

Remote Command Execution Vulnerability Affects Many D-Link Routers

Proof-of-concept (PoC) exploits were recently made public by researchers for remote command execution and information disclosure vulnerabilities affecting many D-Link routers.Miguel Méndez Zúñiga and Pablo Pollanco of Telefónica Chile recently disclosed the details of the vulnerabilities in a couple of blog posts published on Medium. In addition to technical
Publish At:2020-01-02 12:00 | Read:209 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Vulnerabilities Vulnera

Speed, Scale, and Scope: A Threat Analyst's Predictions for Cyberattacks in 2020

The age of cyber warfare is dawning on us, and the threat of cybercrime to businesses continues to multiply by the day. The imperative for effective and autonomous defense is stronger than ever. What can businesses expect in 2020? What cards do cyber-criminals hold in their deck? By analyzing emerging technologies and industry trends, we can anticipate
Publish At:2019-12-31 00:00 | Read:310 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

NextDNS to Provide Encrypted DNS Services to Firefox

Firefox users will be getting private and secure encrypted Domain Name System (DNS) services from NextDNS, after Mozilla added the company to its Trusted Recursive Resolver (TRR) program. A key mechanism for accessing sites and services on the web for over 30 years, DNS translates site domain names into numeric Internet addresses (IPs), and almost all a
Publish At:2019-12-17 22:15 | Read:292 | Comments:0 | Tags:Network Security NEWS & INDUSTRY

Altering the Cyber Terrain and Shaping the Attacker Experience With Deception Technology

In my previous column, I wrote about how to “think like an attacker,” and one of the primary reasons for doing so is being able to leverage the attack surface to your advantage. With technology advancing at such a rapid pace, attackers have a larger playground, and cybersecurity is always in a catch-up/reactive mode. Moving applications and data to the cloud
Publish At:2019-12-17 10:15 | Read:285 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

OPSWAT Acquires Network Access Control Provider Impulse

Critical infrastructure protection company OPSWAT has acquired Network Access Control (NAC) and Software Defined Perimeter (SDP) solutions provider Impulse.OPSWAT helps organizations implement processes to ensure that files and devices are securely transferred to and from critical networks. The company says it provides services to over 98% of U.S. nuclear po
Publish At:2019-12-15 12:00 | Read:294 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Identity & Access M

How to Stop a DDoS Attack Without Sabotaging Your Own Network

DDoS Attacks Are Becoming More Advanced With the Aim to Obfuscate Network ProcessesDistributed denial-of-service (DDoS) is considered one of the ‘original’ network-based cyberattacks and for good reason. One of the earliest known DDoS attacks occurred 20 years ago and was targeted at the University of Minnesota. It used a script that caused more than 100 com
Publish At:2019-12-12 12:00 | Read:372 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security DDOS

Weidmueller Patches Critical Vulnerabilities in Industrial Switches

Germany-based industrial connectivity solutions provider Weidmueller has released firmware updates for many of its managed industrial Ethernet switches to address critical vulnerabilities.Weidmueller has six manufacturing plants and a presence in 60 locations around the world. According to the DHS’s Cybersecurity and Infrastructure Security Agency (CISA), th
Publish At:2019-12-06 10:15 | Read:383 | Comments:0 | Tags:Network Security NEWS & INDUSTRY SCADA / ICS Vulnerabili

When it Comes to Securing Your Environment, Think Like an Attacker

Cybersecurity Teams Need Actionable Insight Into the Latest Techniques, Tactics and Procedures Being Used by Cyber Adversaries We will soon be entering a new decade of the cybersecurity battle, but many of the same challenges remain. Organizations continue to face threats from all angles, security postures haven’t evolved to be more predictive and proac
Publish At:2019-12-03 22:15 | Read:228 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security NEWS & INDUSTRY Secur

Cloudflare Open-Sources Network Vulnerability Scanner

Security and web performance services provider Cloudflare this week announced the open source availability of Flan Scan, its lightweight network vulnerability scanner.Based on the Nmap open source tool, Flan Scan was born out of the need for an easy-to-deploy scanner that could accurately detect the services on a network and then look them up in a database o
Publish At:2019-11-22 22:15 | Read:465 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Vulnerabilities Cloud V

Making the Network the First Line of Defense

Security discussions today seem to start as a ‘them vs. us’ conversation; good guys and bad guys competing to stay ahead of each other. When we were working inside well-defined architectural lines this was fine, but the world of computing has changed. Network and cloud are merging together, what was the physical network can now be in the cloud and vice-versa
Publish At:2019-11-22 00:00 | Read:426 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security

Security Automation Firm ZecOps Raises $10 Million in Seed Funding

ZecOps, a San Francisco-based threat detection and security automation company, announced this week that it has secured a total of $10.2 million through a seed funding round.Founded in 2017, the company has been operating in stealth mode and does not publicly provide much detail on its flagship automated Digital Forensics and Incident Response (DFIR) & A
Publish At:2019-11-20 22:15 | Read:436 | Comments:0 | Tags:Network Security NEWS & INDUSTRY


Share high-quality web security related articles with you:)


Tag Cloud