HackDig : Dig high-quality web security articles for hackers

Effective Threat Intelligence Through Vulnerability Analysis

Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of effort has been invested to capture, curate, taxonomize and communicate the vulnerabilities in terms of severity, impact and com
Publish At:2020-07-30 15:37 | Read:288 | Comments:0 | Tags:Vulnerability Management ENISA Report threat analysis vulner

An analysis of Sodinikibi: The persistent ransomware as a service

If we take a look back, it is clear that one of the main features of ransomware as a threat is that it is continually reinventing itself, persisting in time and effectiveness. These types of attacks have evolved greatly since they first emerged, and today there are many different and varied families in existence. This also implies a greater effort from cyber
Publish At:2020-07-15 03:36 | Read:232 | Comments:0 | Tags:Malware PandaLabs advanced cybersecurity b2b report

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protection of our personal data a fundamental human right. But that was then. What is shaping today’s cybersecurity?
Publish At:2020-06-18 00:31 | Read:450 | Comments:0 | Tags:Featured Articles IT Security and Data Protection AI Cloud C

Attacks Targeting ICS & OT Assets Grew 2000% Since 2018, Report Reveals

The digital threat landscape is always changing. This year is an excellent (albeit extreme) example. With the help of Dimensional Research, Tripwire found out that 58% of IT security professionals were more concerned about the security of their employees’ home networks than they were before the outbreak of coronavirus 2019 (COVID-19). Slightly fewer percenta
Publish At:2020-05-24 09:52 | Read:411 | Comments:0 | Tags:IT Security and Data Protection IBM ics operational technolo

Ryuk: How the ransomware that attacks businesses works

In 2019, ransomware was one of the key players of cybercrime. Companies and official organizations all around the world were hit by cyberattacks that used this kind of malware to encrypt their files and demand a ransom. These waves of ransomware used a range of variants to carry out the attacks. However, there is one variant that was used then, and that is s
Publish At:2020-04-15 06:23 | Read:640 | Comments:0 | Tags:Business Malware PandaLabs Ransomware report

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success rate. This is because c
Publish At:2017-10-23 23:40 | Read:4662 | Comments:0 | Tags:Company News CISO defense dilemma end users hackers infograp

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:5881 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Report: 85% of Ransomware Victims Get Taken Offline For A Week or More

New research reveals that the majority of ransomware victims (85 percent) had their systems taken offline for at least a week, costing businesses thousands in financial damage each day.Despite the risk of data loss and financial damages, the report produced by Timico and Datto found that organizations still lack awareness and readiness when it comes to respo
Publish At:2017-02-28 04:55 | Read:3544 | Comments:0 | Tags:Latest Security News ransomware Report

Cybercrime Reaches New Heights in the Third Quarter

Cybercrime isn’t slowing down anytime soon. This quarter, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. According to the PandaLabs report, 18 million new malware samples were captured in this quarter alone, an average of 200,000 each day. The wave of sophisticated attacks used this quarte
Publish At:2016-10-21 00:50 | Read:4569 | Comments:0 | Tags:Mobile News PandaLabs highlighted Malware news report

FireEye 2016 ICS Vulnerabilities Trend Report: Missed Warnings, Exposed Industrial Environments

Industrial Control Systems (ICS) are the technology workhorses responsible for powering the electric grid and utilities, water treatment plants, oil and gas production, food and beverage manufacturing, and transportation systems, among many others. Our society relies on these systems more than we know to keep life running smoothly.However, a new research rep
Publish At:2016-08-05 01:35 | Read:5559 | Comments:0 | Tags:Featured Articles ICS Security FireEye ICS Vulnerabilties Re

Ponmocup – A giant hiding in the shadows

Ponmocup, first discovered in 2006 as Vundo or Virtumonde, is one of the most successful botnets of the past decade, in terms of spread and persistence. The reasons why this botnet is considered highly interesting are that it is sophisticated, underestimated and is currently largest in size and aimed at financial gain. This underestimated botnet is still in
Publish At:2015-12-13 12:05 | Read:5414 | Comments:0 | Tags:Blog botnet milicenso pirminay ponmocup report threat virtum

2015 Cyberthreat Defense Report Spotlights Changing Security Trends

The CyberEdge Group has released their exhaustive 2015 Cyberthreat Defense Report, jam-packed with insights regarding the latest identified security trends for North America and Europe. The CyberEdge Group bill themselves as “Premier Research and Marketing Services for High-Tech Vendors and Service Providers.” The 41-page PDF report collects data
Publish At:2015-03-19 01:55 | Read:2872 | Comments:0 | Tags:Featured Security news cyberedge cyberthreat report Security

The Evil CVE: CVE-666-666 – “Report Not Read”

I had an interesting discussion with a friend this morning. He explained that, when he is conducting a pentest, he does not hesitate to add sometimes in his report a specific finding regarding the lack of attention given to the previous reports. If some companies are motivated by good intentions and ask for regular pentests against their infrastructure or a
Publish At:2015-02-27 00:45 | Read:3694 | Comments:0 | Tags:Pentesting Security CVE Pentest Report

Security incidents are up - and pricier! - but infosec budgets are dwindling

The number of security incidents is rising, as are associated costs to clean them up.Global corporate security budgets, meanwhile, seem to be hiding in the closet, just hoping it all goes away.The news of this depressing state of affairs comes courtesy of PwC's Global State of Information Security Survey 2015, carried out in conjunction with CIO and CSO maga
Publish At:2014-10-04 01:10 | Read:4697 | Comments:0 | Tags:Data loss Featured Malware Security threats Vulnerability br

SSCC 166.5 - Special edition from the Virus Bulletin 2014 conference [PODCAST]

Sophos Security Chet Chat - Episode 166.5 - September 26, 2014News, opinion, advice and research!Here's our latest security podcast, featuring Sophos experts and Naked Security writers Chester Wisniewski and Paul Ducklin.(Audio player above not working? Download the MP3, or listen on Soundcloud.)In this episode of the Chet ChatIn this special edition, Paul
Publish At:2014-10-02 07:10 | Read:4328 | Comments:0 | Tags:Featured Malware Podcast Vulnerability Android chester wisni

Tools

Tag Cloud