HackDig : Dig high-quality web security articles for hacker

H1 2017 – Twitter suspended a total of 935,897 accounts for the promotion of terrorism

Twitter published its Transparency Report related to H1 2017, the company suspended 935,897 accounts for the promotion of terrorism. Twitter suspends 299,000 accounts linked to terrorism in the first six months of 2017, the company revealed that 75 percent of the infringing accounts were suspended before their first tweet confirming the huge efforts in fight
Publish At:2017-09-21 20:20 | Read:70 | Comments:0 | Tags:Breaking News Reports Social Networks Terrorism propaganda s

CSE CybSec ZLAB Malware Analysis Report: NotPetya

I’m proud to share with you the first report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report NotPetya. As most of you already know I have officially presented my new Co a couple of months ago, CybSec Enterprise is its name and we already started to work on strategic projects that we will reveal soon R
Publish At:2017-09-18 18:30 | Read:150 | Comments:0 | Tags:Breaking News Malware Reports malware Malware Analysis notpe

FICO reports a 39 Percent Rise in Debit Cards Compromised in US

The analytic software firm FICO Reports a 39 Percent Rise in Debit Cards Compromised at ATMs and Merchants in the United States. According to a report published by the analytic software firm FICO, US Debit Cards compromised raise up to 39% in the first six months of 2017 compared to the same timeframe one year prior. In the same period, FICO reported an in
Publish At:2017-09-03 18:25 | Read:184 | Comments:0 | Tags:Breaking News Cyber Crime Reports ATM banking card compromis

Rapid7 warns of Remote Desktop Protocol (RDP) exposure for millions of endpoints

According to a new research conducted by experts at Rapid7, there are 4.1 million Windows endpoints exposed online via Remote Desktop Protocol (RDP). The researchers discovered that there are 11 million open 3389/TCP endpoints, and that 4.1 million of them are RDP. “We analyzed the responses, tallying any that appeared to be from RDP speaking endpoints
Publish At:2017-08-14 18:00 | Read:210 | Comments:0 | Tags:Breaking News Hacking Reports Security EsteemAudit Intellige

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:283 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

AV-TEST: The number of malware decreases, but their complexity increases

According to the AV-TEST Security Report 2016/2017 published by the independent anti-virus testing outfit AV-TEST, the number of malware decreases, but … According to the AV-TEST Security Report 2016/2017 published by the independent anti-virus testing outfit AV-TEST, the number of malware samples detected in 2016 decreased compared to 2015, but they h
Publish At:2017-07-06 08:10 | Read:352 | Comments:0 | Tags:Breaking News Malware Reports AV-TEST Cybercrime Hacking Mac

Reading the 2016 Internet Crime Complaint Center (IC3) report

According to 2106 Internet Crime Complaint Center (IC3) report, 298,728 complaints were received in 2016 totaling more than $1.3 billion in financial loss. According to the new edition of the Internet Crime Complaint Center (IC3) report, 298,728 complaints were received in 2016 totaling more than $1.3 billion in financial loss. The annual FBI’s Internet Crim
Publish At:2017-06-26 08:45 | Read:308 | Comments:0 | Tags:Breaking News Cyber Crime Reports BEC Cybercrime IC3 Interne

Rapid7 report millions of endpoints exposed via SMB, Telnet Ports

A study conducted by the security firm Rapid7 revealed that millions of devices remain exposed to cyber attacks via  SMB, Telnet, RDP, and other types of improper configurations. Rapid7 published the second report National Exposure Index that provides Internet service providers (ISPs) worldwide information about the global exposure of devices. The researche
Publish At:2017-06-16 09:20 | Read:554 | Comments:0 | Tags:Breaking News Hacking Internet of Things Reports botnet Inte

ICS Companies Are Worried About Cybersecurity, But Are They Worried About the Right Things?

Companies operating Industrial Control Systems (ICS) have a special set of challenges to deal with. Which is the state of the art? The equipment was expected to be installed and left alone for a long time. Pressures to reduce operating costs led to this equipment being connected, and the easiest networking equipment to find was designed for convenience in a
Publish At:2017-06-13 07:40 | Read:385 | Comments:0 | Tags:Breaking News Hacking Reports authentication cyber security

The economic impact of cybercrime will reach $8 Trillion by 2022

According to a report published by Juniper Research, the economic impact of cybercrime is expected to reach $8 trillion price tag over the next five years. According to a report published by Juniper Research, the number of data records that will be compromised in security breaches in 2017 will reach 2.8 billion. The economic impact of cybercrime is expecte
Publish At:2017-05-30 23:35 | Read:537 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Reports Security Cybercrim

Insecure Medical devices are enlarging surface of attacks for organizations

A study conducted by the Ponemon Institute shows insecure Medical devices are enlarging the surface of attacks for organizations. A study conducted by the Ponemon Institute, based on a survey of 550 individuals, shows that manufacturers and healthcare delivery organizations (HDO) are concerned about cyber attacks on medical devices. 67 percent of medical dev
Publish At:2017-05-27 21:55 | Read:531 | Comments:781 | Tags:Breaking News Reports Security critical infrastructure Hacki

Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled

Microsoft published the biannual transparency report – The number of US foreign intelligence surveillance requests more than doubled. Microsoft shared data included in the biannual transparency report, the IT giant received more than double what the company said it received under the Foreign Intelligence Surveillance Act (FISA) during the preceding six
Publish At:2017-04-17 21:20 | Read:296 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations Reports biannu

Cyber Risk and Cyber Insurance – Insurance challenge to the CIO as corporate Cyber Security Effectiveness manager

[By Cesare Burei, Margas on courtesy of @CLUSIT – Rapporto Clusit 2017 – All right reserved] Until the corporate Risk Managers dealing with Cyber Risk, and there are not many of these, start working at all levels, who shall be entrusted with the management of Cyber Risks and, more specifically, with the transfer of risk to the Insurance Companies? The
Publish At:2017-04-05 19:25 | Read:953 | Comments:0 | Tags:Breaking News Reports Security cyber risk cyber security Pie

Industrial Sector ICSs under attack – Kaspersky Lab’s ICS-CERT

The report shows a disconcerting reality, the number of targeted attacks on the ICSs deployed in the Industrial sector continues to increase. The Kaspersky Lab’s ICS-CERT has published a report on the threat landscape for industrial automation systems (ICSs) related to second half of 2016. The report shows a disconcerting reality, the number of targeted atta
Publish At:2017-03-29 03:00 | Read:535 | Comments:0 | Tags:Breaking News Hacking Reports

How much costs a DDoS attack service? Which factors influence the final price?

How much costs a DDoS attack service? Kaspersky Lab published an analysis on the cost of a DDoS attack and services available in the black markets. The DDoS attacks continue to be a profitable business in the cyber criminal underground. Powering a DDoS attack against an organization is even cheaper, running an attack can cost as little as $7 an hour, while a
Publish At:2017-03-26 19:40 | Read:631 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Reports booters Cybercrime

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud