HackDig : Dig high-quality web security articles

“Huge upsurge” in DDoS attacks during pandemic

Researchers at Netscout have released a report analyzing the malicious internet traffic of 2020 and comparing it to the years before. Some of the results were as expected: Brute-forcing credentials and more targeting towards internet-connected devices were foreseeable and have been discussed at length. And even a record-breaking year in Distributed Denial of
Publish At:2021-04-15 15:39 | Read:95 | Comments:0 | Tags:Reports DDOS

FireEye: 650 new threat groups were tracked in 2020

FireEye published its M-Trend 2021 report based on the data collected during the investigation, 650 new threat groups were tracked in 2020 FireEye published its annual report, titled M-Trend 2021, which is based on the data collected during the investigation on security incidents it managed. Most of the incidents investigated by Mandiant (59%) in 2020 wer
Publish At:2021-04-14 11:40 | Read:174 | Comments:0 | Tags:APT Breaking News Cyber Crime Cyber warfare Reports Hacking

NAME:WRECK, a potential IoT trainwreck

A set of vulnerabilities has been found in the way a number of popular TCP/IP stacks handle DNS requests. Potentially this could impact hundreds of millions of servers, smart devices, and industrial equipment. The researchers that discovered the vulnerabilities have named them NAME:WRECK. Plural vulnerabilities? Yes, the researchers found 9 DNS-related
Publish At:2021-04-13 12:44 | Read:144 | Comments:0 | Tags:Reports dns dnspooq freebsd government healthcare ipnet name

Millions of devices impacted by NAME:WRECK flaws

Security experts disclosed nine flaws, collectively tracked as NAME:WRECK, affecting implementations of the DNS protocol in popular TCP/IP network communication stacks. Security researchers disclosed nine vulnerabilities, collectively tracked as NAME:WRECK, that affect implementations of the Domain Name System protocol in popular TCP/IP network communicat
Publish At:2021-04-13 10:19 | Read:90 | Comments:0 | Tags:Hacking Reports Security hacking news information security n

How bitcoin payments unmasked a man who hired a Dark Web contract killer

An Italian citizen’s apparent attempt to hire a hitman on the Dark Web has been undone by clever analysis of his Bitcoin transactions. The man, who is reported to be an IT worker employed by a major corporation, is alleged to have paid the hitman to assassinate his former girlfriend. What happened? According to a news article published by Europe
Publish At:2021-04-12 09:19 | Read:109 | Comments:0 | Tags:Reports big data crypto-analysis Dark Web darkweb monitor eu

SAP systems are targeted within 72 hours after updates are released

On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm Onapsis warns. According to a joint study published by Onapsis and SAP, on-premises SAP systems are targeted by threat actors within 72 hours after security patches are released. Threat actors perform reverse-engineering
Publish At:2021-04-06 14:11 | Read:179 | Comments:0 | Tags:Breaking News Hacking Reports CISA information security news

Firmware attacks, a grey area in cybersecurity of organizations

A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently published a report that states, titled “March 2021 Security Signals report,” that revealed that more than 80% of enterprises were victims of at least one firmware attack in the past two years. The study
Publish At:2021-04-05 06:59 | Read:275 | Comments:0 | Tags:Breaking News Hacking Reports Cybersecurity Firmware hacking

FBI published a flash alert on Mamba Ransomware attacks

The Federal Bureau of Investigation (FBI) issued an alert to warn that the Mamba ransomware is abusing the DiskCryptor open source tool to encrypt entire drives. The Federal Bureau of Investigation (FBI) published an alert to warn that the Mamba ransomware is abusing the DiskCryptor open-source tool (aka HDDCryptor, HDD Cryptor) to encrypt entire drives.
Publish At:2021-03-26 04:58 | Read:202 | Comments:0 | Tags:Breaking News Cyber Crime Malware Reports FBI Hacking hackin

Report goes “behind enemy lines” to reveal SilverFish cyber-espionage group

The PRODAFT Threat Intelligence Team has published a report (pdf) that gives an unusually clear look at the size and structure of organized cybercrime. It uncovered a global cybercrime campaign that uses modern management methods, sophisticated tools—including its own malware testing sandbox—and has strong ties with the SolarWinds attack, the EvilCorp gr
Publish At:2021-03-22 09:42 | Read:270 | Comments:0 | Tags:Reports cobalt strike domain fronting empire evil corp evilc

Which is the Threat landscape for the ICS sector in 2020?

The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a report that provided details about the threat landscape for ICS engineering and integration sector in 2020. The experts gathered data related to the cyberthreats t
Publish At:2021-03-22 07:18 | Read:241 | Comments:0 | Tags:Breaking News ICS-SCADA Malware Reports Security Hacking hac

FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK

The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert to warn about an increase in PYSA ransomware attacks against education institutions in the United States and the United Kingdom. In March 2020, CERT France cyber-security agency warned about a
Publish At:2021-03-17 10:18 | Read:312 | Comments:0 | Tags:Breaking News Cyber Crime Malware Reports Cybercrime FBI Hac

Police credit “unlocked” SKY ECC encryption for organized crime bust

At the moment, I’m really torn, and I need your help. Let me tell you what is going on. I read these statements and they can’t both be true, right? “The continuous monitoring of the illegal Sky ECC communication service tool by investigators in three countries has provided invaluable insights into hundreds of millions of messages exchanged between crimina
Publish At:2021-03-11 12:24 | Read:196 | Comments:0 | Tags:Reports encrochat encryption eurojust europol

New Ryuk ransomware implements self-spreading capabilities

French experts spotted a new Ryuk ransomware variant that implements self-spreading capabilities to infect other devices on victims’ local networks. Experts from French national cyber-security agency ANSSI have spotted a new Ryuk ransomware variant that implements worm-like capabilities that allow within local networks. “On top of its usual
Publish At:2021-02-26 21:42 | Read:361 | Comments:0 | Tags:Breaking News Malware Reports Hacking hacking news informati

TikTok pays $92 million to end data theft lawsuit

TikTok, the now widely popular social media platform that allows users to create, share, and discover, short video clips has been enjoying explosive growth since it appeared in 2017. Since then, it hasn’t stopped growing—more so during the current pandemic.  While we can no longer categorize TikTok as a kids’ app, most concerns about the app have bee
Publish At:2021-02-26 16:18 | Read:307 | Comments:0 | Tags:Privacy Reports artificial intelligence bytedance Chinese fa

Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report

Last year, threat actors took advantage of the COVID-19 public health crisis in a way previously considered unimaginable, not only preying on uncertainty and fear during the initial months of the global pandemic, but retooling attack methods, reneging on promises, strengthening malware, and extorting victims to the tune of $100 million—and that was without t
Publish At:2021-02-16 10:36 | Read:388 | Comments:0 | Tags:Reports 2021 State of Malware report Android Assurance Wirel