HackDig : Dig high-quality web security articles for hacker

Magecart is back: hotels in the firing line

Back in July, a group of cyberattackers called Magecart made the e-commerce word shake. Its malicious skimming code, which is inserted into the websites of these businesses to steal personal and financial data from their customers when making purchases, was discovered on nearly 18,000 domains. And this incident wasn’t the only one. A year ago, British Airway
Publish At:2019-10-11 10:35 | Read:58 | Comments:0 | Tags:News Security business hotel chains supply chain

Panda Security and Infinigate France sign a distribution agreement.

This partnership is perfectly in line with Panda Security’s strategy of developing its network of partners in order to accelerate its growth on the B2B market in France. Panda Security France officially announces a new distribution agreement with Infinigate France, one of the main European VADs operating in the cybersecurity sector. This decision fol
Publish At:2019-10-10 10:35 | Read:157 | Comments:0 | Tags:News Panda Security business edr france

OpenDreamBox: the vulnerability that affects 32% of the world’s companies

The Internet of things (IoT) has revolutionized the business world. It has helped to streamline industrial processes, reduce costs, and has even created new business models. But, as is often the case, all of these advantages go hand in hand with a series of disadvantages. The most important of these disadvantages is the significant increase in the attack sur
Publish At:2019-10-09 10:35 | Read:185 | Comments:0 | Tags:News Security business IoT vulnerabilities Vulnerability

Ransomware hits several Spanish city halls

Ransomware is back. Well, in fact, it never went away. However, what is true that from time to time we see more aggressive campaigns with a wider impact, or attacks that are more striking or more flashy. The list of institutions affected by this kind of malware this year keeps growing. In May, the city of Baltimore was attacked with a strand of ransomware ca
Publish At:2019-10-08 10:35 | Read:204 | Comments:0 | Tags:Malware News business governments Ransomware

A run-time approach for penetration testing of iOS apps Part-I

Hello everybody, This article will cover dynamic run-time penetration testing of iOS applications using objection framework. Objection is a run-time mobile exploration toolkit, powered by Frida. Objection injects uses Frida to injects objects into application run-time in order to execute certain tasks in security context. Objection framework let
Publish At:2019-10-07 07:25 | Read:234 | Comments:0 | Tags:News infosec ios applications iospentesting Mobile Applicati

A run-time approach for pen-testing iOS applications Part-II (Objection in Action)

Objection in Action Once all things go right, we can inject Frida scripts into our target application. Open target application and enter following command in powershell objection -g YOUR-APPLICATION-NAME explore You will now have access to application’s file over device’s shell Test Cases: > Application exploration: 1. To brows
Publish At:2019-10-07 07:25 | Read:141 | Comments:0 | Tags:News infosec ios ios applications iospentesting Mobile Appli

UK Government Warn Schools Over Cyberthreats

The subject of cybersecurity within the education sector is a key topic at the moment, particularly with the rise in reported ransomware incidences and data breaches. The National Cyber Security Centre (NCSC), tasked with providing cybersecurity advice and support to the UK public and private sectors, has released a report on The cyber threat to Universities
Publish At:2019-10-04 10:35 | Read:182 | Comments:0 | Tags:News business education UK

Health Data of 5 Million Americans Freely Accessible Online

Personal details of approximately 5 million U.S. residents that include security information, X-rays and MRIs, and in some cases even SSNs are sitting readily available for anyone “armed” with a browser and access to the internet. In a collaboration between ProPublica and the German broadcaster Bayerischer Rundfunk, the media organizations identi
Publish At:2019-10-03 10:35 | Read:238 | Comments:0 | Tags:Mobile News News cybersecurity Privacy

Fraud with a deepfake: the dark side of artificial intelligence

Over the last few years, fake news has been a major worry. Fake news is believed to have played an important role in such important electoral processes as the 2016 US presidential election and the Brexit referendum on the withdrawal of the United Kingdom from the European Union the same year. There is now another kind of fake that is causing concern: deep fa
Publish At:2019-10-02 10:35 | Read:188 | Comments:0 | Tags:News Security artificial intelligence business Scam

Operation reWired: 281 BEC scammers arrested worldwide

BEC scams (business email compromise) are big business for cybercriminals. According to the Financial Crimes Enforcement Network (FinCEN), these scams generate around $301 million every month, or $3.6 billion a year. The aim of a BEC scam is to trick an employee into carrying out a fraudulent bank transfer. To do this, cyberattackers send an email impersonat
Publish At:2019-09-27 10:35 | Read:199 | Comments:0 | Tags:News Security bec business scams

Internet Explorer and Microsoft Defender: vulnerable to RCE attacks

Last year, an average of 45 vulnerabilities were discovered every day. This is almost three times more than in 2016. . Cyberincidents as well-known as WannaCry, the Equifax data breach, and the cyberattack on the Winter Olympics are were all facilitated by a vulnerability. Last month, a vulnerability in the WebAdmin plugin of OpenDreamBox was discove
Publish At:2019-09-26 10:35 | Read:230 | Comments:0 | Tags:News Security business vulnerabilities Windows

LYCEUM and the dangers of spear phishing

Critical infrastructure is one of the favorite targets for the sophisticated attacks carried out by APTs (advanced persistent threats). What makes these APTs really dangerous is the fact that their attacks are never random, and always have a specific target. If an advanced cyberattack managed to paralyze the water supply, or interrupt hospital service, the A
Publish At:2019-09-19 17:05 | Read:186 | Comments:0 | Tags:News Security business critical infrastructure spear phishin

One third of Americans’ cell numbers available on password-free server

Cell Numbers of one-third of the US population found on a password-free server Approximately 133 million US-based cell numbers are part of the 419 million records found by cyber-security researches on a password-free server. The private data is originating from Facebook. Most of the entries stored on the easily accessible server contained not only cell numbe
Publish At:2019-09-19 17:05 | Read:230 | Comments:0 | Tags:Mobile News News cybersecurity data breach news

Panda Security presents EDR and beyond at Gartner IT Symposium/Xpo 2019

This month, Cape Town will play host to the African leg of the Gartner IT Symposium/Xpo 2019. The three-day conference and expo will be held at the Cape Town International Convention Centre (CTICC2), and aims to explore the technology, insights and trends that are shaping the future of IT and business. Panda Security will be represented at the event, with a
Publish At:2019-09-19 17:05 | Read:139 | Comments:0 | Tags:News Panda Security Africa business gartner

How secure is the new iPhone 11?

Apple officially announced its latest series of mobile phones at an event in Silicon Valley. The new iPhone 11 series have already become available for preorder on Sept 13th and are expected to start shipping on the 20th. The new iPhone comes in three versions – 11, Pro and Pro Max. The significant difference between the three devices is the size, the
Publish At:2019-09-19 17:05 | Read:78 | Comments:0 | Tags:Mobile News News cybersecurity news technology


Share high-quality web security related articles with you:)


Tag Cloud