HackDig : Dig high-quality web security articles for hacker

Healthcare sector targeted : what you need to know about the hackers very unusual strategy

Orange Cyberdefense’s Epidemiology Lab has published a report on cyberattacks targeting the healthcare sector. While COVID-19 infections around the world are exploding, cyber threat actors are trying to capitalise on this global health crisis by creating malwares or launching attacks with a COVID-19 theme. Last week, a COVID-19 testing centre was hit by a
Publish At:2020-03-21 04:45 | Read:231 | Comments:0 | Tags:Cyber Crime Hacking Reports COVID-19 healthcare information

Most ransomware attacks take place outside the working hours

Most of the ransomware attacks targeting the enterprises occur outside working hours, during the nighttime or during the weekend. Security experts from FireEye published an interesting report on the Ransomware deployment trends, it revealed that most of the attacks (76%) against the enterprise sector occur outside working hours. FireEye compiled the r
Publish At:2020-03-17 15:40 | Read:205 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Reports informatio

Most of the attacks on Telecom Sector in 2019 were carried out by China-linked hackers

China-linked cyber espionage groups increasingly targeted organizations in the telecommunications industry in 2019. According to the CrowdStrike 2020 Global Threat Report, the telecommunications and government sectors were the most targeted by the threat actors. Experts monitored operations carried out by nation-state actors and financially-motivated
Publish At:2020-03-05 05:02 | Read:271 | Comments:0 | Tags:APT Cyber warfare Hacking Malware Reports China Cyberespiona

Which are the most dangerous mobile app stores online?

An interesting report published by RiskIQ on 2019 Mobile App Threat Landscape, lists the most dangerous mobile app store online. Mobile users downloaded over 200 billion apps in 2019 and the overall expense in app stores worldwide has been estimated in more than $120 billion. Threat actors don’t want to miss this amazing business opportunity and
Publish At:2020-02-28 11:50 | Read:488 | Comments:0 | Tags:Breaking News Hacking Malware Mobile Reports app stores info

FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

FireEye’s report revealed that the incident response division Mandiant observed more than 500 new malware families in 2019. According to the FireEye Mandiant M-Trends 2020 report, FireEye analyzed 1.1 million malware samples per day in 2019 and identified 1,268 malware families. The most worrisome figure is related to the number of previously unseen malwa
Publish At:2020-02-24 05:10 | Read:312 | Comments:0 | Tags:Breaking News Hacking Malware Reports information security n

Dragos Report: Analysis of ICS flaws disclosed in 2019

More than 400 flaws affecting industrial control systems (ICS) were disclosed in 2019, more than 100 were zero-day vulnerabilities. According to a report published by Dragos, the experts analyzed 438 ICS vulnerabilities that were reported in 212 security advisories, 26% of advisories is related to zero-day flaws. The experts determined 116 unique type
Publish At:2020-02-21 02:30 | Read:310 | Comments:0 | Tags:Breaking News ICS-SCADA Reports Hacking hacking news ICS inf

Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack

Peripheral devices with unsigned firmware can expose Windows and Linux machines to hack, warn experts from firmware security firm Eclypsium. Experts at firmware security firm Eclypsium have discovered that many peripheral device manufacturers have not implemented security checks to prevent the installation of firmware from an untrusted source. An atta
Publish At:2020-02-18 13:33 | Read:257 | Comments:0 | Tags:Breaking News Hacking Reports Firmware hacking news it secur

US Govt agencies detail North Korea-linked HIDDEN COBRA malware

The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released reports on North Korea-linked HIDDEN COBRA malware. The FBI, the US Cyber Command, and the Department of Homeland Security have published technical details of a new North-Korea linked hacking operation. The government experts released new an
Publish At:2020-02-15 17:31 | Read:298 | Comments:0 | Tags:APT Hacking Malware Reports CISA FBI information security ne

OT attacks increased by over 2000 percent in 2019, IBM reports

According to IBM, OT attacks increased by over 2000 percent in 2019, most of them involved the Echobot IoT malware. IBM’s 2020 X-Force Threat Intelligence Index report analyzes the threat landscape in 2019, the experts observed a spike in the number of OT attacks. According to IBM X-Force, attacks targeting operational technology (OT) infrastructure in
Publish At:2020-02-11 12:45 | Read:283 | Comments:0 | Tags:Hacking Internet of Things Malware Reports Echobot informati

Malwarebytes Labs releases 2020 State of Malware Report

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a doozy. From an increase in enterprise-focused threats to the diversification of sophisticated hacking and stealth techniques, the 2019 threat landscape was shaped by a cybercrime industry that aimed to show i
Publish At:2020-02-11 04:50 | Read:497 | Comments:0 | Tags:Reports 2020 state of malware report adware Android android

Labs report finds cyberthreats against healthcare increasing while security circles the drain

The team at Malwarebytes Labs is at it again, this time with a special edition of our quarterly CTNT report—Cybercrime tactics and techniques: the 2019 state of healthcare. Over the last year, we gathered global data from our product telemetry, honeypots, threat intelligence, and research efforts, focusing on the top threat categories and families that plagu
Publish At:2019-11-13 09:50 | Read:512 | Comments:0 | Tags:Reports APIs biotech EHR electronic health record emotet hea

One Third of The Internet Has Seen a DDoS Attack In The Past Two Years

A group of researchers has conducted a rigorous comprehensive characterization of this DDoS attacks and of countermeasures to mitigate the associated risks. Denial of Service (DoS) attacks have been around about as long as computers have been network connected. A website’s purpose is to accept connections from the Internet and return information. A bad
Publish At:2017-11-07 05:10 | Read:17172 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Reports botnet DDoS attack

CSE Malware ZLab – Full report of Bad Rabbit attack

The researchers at CSE Cybsec ZLab have completed their analysis the Bad Rabbit ransomware, the report follows our preliminary analysis. Introduction Recently a new ransomware, called BadRabbit, infected systems in many countries, most of in East Europe, such as Ukraine and Russia. The malware was not totally new, it seems to be an evolution of the old NotPe
Publish At:2017-11-01 19:50 | Read:4741 | Comments:0 | Tags:Breaking News Malware Reports Bad Rabbit ransomware Cybercri

Digging the Middle East and North African cybercrime underground market

Security experts from Trend Micro have published an interesting report on the Middle East and North African cybercrime underground market, enjoy it! We explained several times that criminal communities adopt different tactics, techniques, and procedures (TTPs) depending on the location they operate. Experts at Trend Micro have highlighted the differences be
Publish At:2017-10-27 15:05 | Read:4073 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Reports credit card Hacki

Exclusive – CSE ZLab experts spotted a new Wonder botnet in the wild

The CSE CybSec Z-Lab Malware Lab spotted a new botnet, dubbed Wonder botnet, while it was investigating malicious code in the dark web. While investigating the malicious code in the dark web, ZLab experts discovered a “NetflixAccountGenerator.exe” that promises to generate a premium account for Netflix services for free. Unfortunately, the software downloade
Publish At:2017-10-23 18:55 | Read:4513 | Comments:0 | Tags:Breaking News Deep Web Hacking Malware Reports botnet CSE ma


Share high-quality web security related articles with you:)


Tag Cloud