HackDig : Dig high-quality web security articles for hacker

PlayStation Network Hacked. Again.

When mysterious tweets appeared on the official Sony PlayStation Twitter feed on Monday morning, it quickly became clear that the account had been hacked. Indeed, the hackers made little effort to hide their activities, proudly announcing that the breach had been carried out by the OurMine Security Group. Photo credit: Twitter Initially there were a few twee
Publish At:2017-08-23 14:50 | Read:94 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block
Publish At:2017-08-22 04:50 | Read:155 | Comments:0 | Tags:News Panda Security alliance cybersecurity deloitte

Detect and Prevent Data Exfiltration Webinar with Infoblox

Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview Data is the new currency i
Publish At:2017-08-16 18:15 | Read:174 | Comments:0 | Tags:News Webinar

US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch attacks on smart home devices.Trend Micro’s recent report shows more than 1.8 million cyberattacks have been conducted through home network routers in the past six months.
Publish At:2017-08-16 02:40 | Read:148 | Comments:0 | Tags:Don't miss Featured news News Internet of Things survey Tren

Understanding your responsibility and security in the cloud

In this podcast recorded at Black Hat USA 2017, Chris Drake, CEO at Armor, talks about the difference between security of the cloud and security in the cloud.Here’s a transcript of the podcast for your convenience.I’m Chris Drake, founder and CEO of Armor. We are a cloud cybersecurity services company and I wanted to talk today
Publish At:2017-08-09 19:55 | Read:139 | Comments:0 | Tags:Don't miss Editor's choice Featured news News Armor Black Ha

Thick Client Penetration Testing – 3(JavaDeserialization Exploit: RCE)

Thick Client Penetration Testing – 3 (Java Deserialization Exploit: Remote Code Execution) Welcome Readers, in the previous two blogs, we have learnt about the various test cases as well as setting up traffic for thick clients using interception proxy. Among the plethora of test cases out here, one particularly interesting is about “Remote Code Execution on
Publish At:2017-08-05 02:15 | Read:278 | Comments:0 | Tags:News exploit

HBO hacked: Not even Daenerys dragons can protect Game of Thrones from leak

As you have probably heard already, hackers might be holding 1.5 terabytes of HBO proprietary information. No one knows what kind of information they have managed to steal, but one is for sure, the Game of Thrones script for season 7 has been reported as leaked. On Sunday afternoon reporters received an anonymous email saying: “Hi to all mankind. The greates
Publish At:2017-08-02 04:55 | Read:250 | Comments:0 | Tags:Mobile News News cyberattack Game of thrones hack HBO

PandaLabs Records a 40% Increase in Attacked Devices this Quarter

Traditional security solutions, although efficient in protecting against known malware, are incapable of protecting against attacks that use non-malicious tools and other advanced techniques. This argument has gained traction in recent investigations carried out by PandaLabs, the anti-malware laboratory at Panda Security. The laboratory presents its second q
Publish At:2017-08-01 10:30 | Read:271 | Comments:0 | Tags:News PandaLabs cybersecurity Malware quarterly report

Thick Client Penetration Testing- 1

Why thick client penetration testing? Thick client applications are not new having been in existence for a long time, however if given to perform a pentest on thick clients, it is not as simple as a Web Application Pentest. Thick clients are majorly used across organizations for their internal operations. In this series of articles, we will learn various to
Publish At:2017-07-29 22:25 | Read:171 | Comments:0 | Tags:News

Thick Client Penetration Testing – 2 ( Traffic Analysis)

After getting the basics of thick client pentest, let’s delve into the very first steps you can take to commence thick client pentest. Interception and setting up proxy of application. Thick clients can be broken down into two types based on proxy settings: Proxy aware Proxy unaware Proxy aware are those applications which has settings in the application i
Publish At:2017-07-29 22:25 | Read:160 | Comments:0 | Tags:News

The biggest cybersecurity breaches of 2017…so far

What can we learn from the latest cybersecurity breaches The frequency and impact of cybercrime has been steadily escalating for several years now, but 2017 has been one of the worst– at least in terms of media headlines. Worse still, we’re only half way through the year. So what has happened, and what can you learn? NSA hacking tools are stolen and leaked T
Publish At:2017-07-11 08:20 | Read:246 | Comments:0 | Tags:Mobile News News cybersecurity Hackers Ransomware

Cybersecurity Debate on the Agenda at the G20

In today’s geopolitical moment, attacks against the privacy of large companies and individuals have become one of the great dangers of life online. Many large organizations have yearly budgets in the millions for security programs and protocols to secure their networks. Ostensibly, they are shielding their customers’ data, but it is also an investment
Publish At:2017-07-10 13:55 | Read:181 | Comments:0 | Tags:News cybersecurity cyberwarfare g20

New WhatsApp updates on the way – how to stay safe

Tips to be protected against WhatsApp malware As the most popular messaging application of all time, you would expect WhatsApp to be updated with new features quite regularly. Sure enough, a new update is due to arrive in a matter of days, offering several new functions that will make the app even more useful. But like every new update, you need to take care
Publish At:2017-06-29 20:10 | Read:403 | Comments:0 | Tags:Mobile News News Android cybersecurity Malware WhatsApp

GoldenEye/Petya Attack Spreads Rapidly, Recalling WannaCry

On June 27, 2017, a large-scale attack using a variant of the ransomware family known as GoldenEye affected much of the world. In addition to encrypting files on the computer, this ransomware family is characterized by encrypting the MBR when it has permissions, thus blocking full access to the computer. The attack can almost be seen as a replica of the much
Publish At:2017-06-28 07:20 | Read:276 | Comments:0 | Tags:Malware News goldeneye PandaLabs petya Ransomware

Panda Security and Stormshield Announce a European Technology Alliance Against Cyber Threats

Panda Security, the Spanish multinational leader in endpoint security solutions, and Stormshield, the French leader in enterprise network protection, have announced the establishment of a European strategic alliance, combining their expertise to more efficiently secure companies’ IT infrastructures and environments and help them with their digital transforma
Publish At:2017-06-27 12:55 | Read:222 | Comments:0 | Tags:News Panda Security cybersecurity stormshield technological


Share high-quality web security related articles with you:)


Tag Cloud