HackDig : Dig high-quality web security articles for hacker

7 Questions to Ask Your Child’s School About Cybersecurity Protocols

Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the headlines. While you’ve made digital security strides in your home, what concerns if any should you have about your child’s data being compromised at school? There’s a long and short answer to that question. The short answer is don’t
Publish At:2019-09-19 23:20 | Read:67 | Comments:0 | Tags:Family Safety BYOD cyberattack cybercrime cybersafety cybers

Incident Response report 2018

 Download full report (PDF) Introduction This report covers our team’s incident response practices for the year 2018. We have thoroughly analyzed all the service requests, customer conversations and incident response deliverables to provide you an overview in numbers. The report includes statistics on how companies reveal data breaches and comprom
Publish At:2019-09-19 18:20 | Read:83 | Comments:0 | Tags:Featured Publications APT DDoS-attacks Financial malware Ind

Island hopping: the tactic de rigueur among cyberattackers

Ransomware is undergoing something of a revival. In 2018, detections of this type of malware fell, while other cyberthreats such as cryptojacking experienced major growth. However, in the first quarter of 2019, ransomware attacks against companies increased 195%. The most extreme proof of this resurgence was a series of targeted ransomware attacks against lo
Publish At:2019-09-19 17:05 | Read:33 | Comments:0 | Tags:Malware News business governments Ransomware

Hacker conventions: Black Hat and DEF CON – Intego Mac Podcast, Episode 96

The Intego Mac Podcast episode 96 is now available!Summer is when hackers get together to present and discuss malware, vulnerabilities, and exploits. Two big hacker conventions - Black Hat and DEF CON - were held recently, and we discuss some of the Mac-related discoveries. We also look at some interesting news, including certain Macs being banned by the FCC
Publish At:2019-09-19 16:40 | Read:47 | Comments:0 | Tags:Intego Mac Security Podcast Black Hat DEF CON Intego Mac Pod

When PSD2 Opens More Doors: The Risks of Open Banking

By Feike Hacquebord, Robert McArdle, Fernando Mercês, and David Sancho As more industries adapt to cater to the increasingly mobile market, the financial industry is the latest to experience a shake-up. The Revised Payment Service Directive (PSD2) – also known as Open Banking – is a new set of rules for the European Union (EU) that’s expected to affect
Publish At:2019-09-19 14:50 | Read:95 | Comments:0 | Tags:Bad Sites Internet of Things Malware Mobile Ransomware Vulne

The Clicking Bot Applications

Cyber crime, like any crime, has its motives; each malware has its own malicious profit. Spyware spies on you. Ransomware demands a ransom to decrypt your private digital data. Phishing Malware phishes for your username, password or account numbers. Installation-fraud achieves fake software installations. Ad fraud fraudulently represents online advertisement
Publish At:2017-11-07 10:45 | Read:39793 | Comments:2 | Tags:Analysts Android App Security Mobile Malware Threat Research

The GIBON Ransomware appears in the threat landscape

A new strain of ransomware dubbed GIBON ransomware was spotted by the ProofPoint researcher Matthew Mesa that observed it being distributed via malspam. The spam messages use a malicious document as attachment containing macros that once enabled will download and install the ransomware on a victim’s machine. The researcher dubbed the ransomware GIBON b
Publish At:2017-11-06 10:45 | Read:4710 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime GIBON Ransomwar

MBR-ONI ransomware involved in targeted attacks against Japanese organizations

MBR-ONI is a new ransomware that is being used for targeted attacks in Japan, experts speculate it was used to cover larger hacking campaigns. MBR-ONI is a new ransomware that is being used for targeted attacks in Japan, it is a bootkit ransomware that uses a modified version of the legitimate open-source disk encryption utility DiskCryptor to encrypt the fi
Publish At:2017-11-01 19:50 | Read:4455 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Hacking malware

CSE Malware ZLab – Full report of Bad Rabbit attack

The researchers at CSE Cybsec ZLab have completed their analysis the Bad Rabbit ransomware, the report follows our preliminary analysis. Introduction Recently a new ransomware, called BadRabbit, infected systems in many countries, most of in East Europe, such as Ukraine and Russia. The malware was not totally new, it seems to be an evolution of the old NotPe
Publish At:2017-11-01 19:50 | Read:3981 | Comments:0 | Tags:Breaking News Malware Reports Bad Rabbit ransomware Cybercri

Experts spotted a new strain of the Sage Ransomware that implements Anti-Analysis capabilities

Security experts from Fortinet spotted a new strain of the Sage ransomware that included new functionalities, such as anti-analysis capabilities. Sage 2.0 is a new ransomware first observed in December and not now it is distributed via malicious spam. Sage is considered a variant of CryLocker ransomware, it is being distributed by the Sundown and RIG exploit
Publish At:2017-11-01 01:25 | Read:4572 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Hacking malware

Documents encrypted by Bad Rabbit ransomware could be recovered without paying ransom

Files Encrypted by Bad Rabbit Recoverable Without Paying Ransom. Some victims of the recent Bad Rabbit attack may be able to recover their files encrypted by the ransomware without paying the ransom. The discovery was made by researchers at Kaspersky Lab that analyzed the encryption functionality implemented by the ransomware. Once the ransomware infects a
Publish At:2017-10-28 09:30 | Read:4628 | Comments:0 | Tags:Breaking News Cyber Crime Malware Bad Rabbit ransomware Cybe

UK Government links the WannaCry attack that crippled NHS to North Korea

UK Government blamed North Korea for the WannaCry attack that affected a third of English hospitals. “This attack, we believe quite strongly that it came from a foreign state,” Ben Wallace, a junior minister for security, told BBC Radio 4’s Today programme. “North Korea was the state that we believe was involved in this worldwide atta
Publish At:2017-10-27 15:05 | Read:2570 | Comments:0 | Tags:Breaking News Cyber warfare Intelligence Malware hospitals m

CSE Malware ZLab – Preliminary analysis of Bad Rabbit attack

We at the CSE Cybsec ZLab have conducted a preliminary analysis of the Bad Rabbit ransomware discovering an interesting aspect of the attack. This is just the beginning of a complete report that we will release in the net days, but we believe our findings can be useful for the security community. This malware remembers the notorious NotPetya basically for tw
Publish At:2017-10-26 02:15 | Read:3743 | Comments:0 | Tags:Breaking News Cyber Crime Malware Bad Rabbit ransomware Cybe

Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry

It’s been nearly six months since the WannaCry ransomware stole global headlines and thousands of security practitioners flocked to threat intelligence feeds to help streamline their investigations. While the security community has learned many valuable lessons from the attack, it’s impossible to say that a strike of this magnitude won’t ha
Publish At:2017-10-26 01:10 | Read:4081 | Comments:0 | Tags:Malware Security Intelligence & Analytics Threat Intelligenc

Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks

On Tuesday morning, Oct. 24, 2017, organizations in Russia and Ukraine reported being hit with a ransomware outbreak that paralyzed their operations. Sporadic cases were also recorded in Turkey, Germany, Bulgaria and Japan, according to reports from different sources. The malware, self-titled Bad Rabbit, is a ransomware code designed to encrypt and lock file
Publish At:2017-10-26 01:10 | Read:3650 | Comments:0 | Tags:Advanced Threats Malware Threat Intelligence Cyberattack Cyb


Share high-quality web security related articles with you:)


Tag Cloud