HackDig : Dig high-quality web security articles for hacker

Hundreds of Fake Election Domains Target Democrats, Republicans

Threat intelligence company Digital Shadows has uncovered over 550 fake domains attempting to mimic websites related to the 2020 presidential election in the United States.The company’s researchers identified typosquatted domains targeting Democratic and Republican candidates, along with funding sites of the Republican Party.Roughly one-third of the typosqua
Publish At:2019-10-16 12:00 | Read:174 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Risk Management Ma

Huawei Says Nine-Month Revenue Up Despite US Pressure

Chinese tech giant Huawei said on Wednesday that its revenue for the first nine months of the year grew by almost a quarter despite a US campaign to isolate the company globally.Huawei's revenues jumped 24.4 percent on-year to 610.8 billion yuan ($86.2 billion) and its profit margin increased 8.7 percent, it announced.Huawei, based in the southern Chinese ci
Publish At:2019-10-16 12:00 | Read:152 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Complia

Why All Security Disciplines Should Use the Intelligence Cycle

The intelligence cycle is often underutilized in nearly every area of security. This iterative process through which data or information becomes intelligence can streamline, focus, and provide strategic guidance in myriad situations that extend far beyond the realm of traditional intelligence operations. But despite these benefits, in most cases (at least in
Publish At:2019-10-14 12:00 | Read:301 | Comments:0 | Tags:INDUSTRY INSIGHTS Incident Response Risk Management

Tor to Reject End-of-Life Relays by Default

Starting with its next stable release, Tor (The Onion Router) browser will reject End-Of-Life relays by default, the Tor Project has announced.There are over 6,000 relays in the Tor network at the moment, some running software released going all the way back to the 0.2.4.x series, released on December 10, 2013. There are also 85 different Tor versions in use
Publish At:2019-10-10 12:00 | Read:296 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Risk Management Security Infrast

APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns

Advanced persistent threat (APT) actors have been exploiting recently disclosed vulnerabilities affecting enterprise VPN products from Fortinet, Palo Alto Networks and Pulse Secure, the UK’s National Cyber Security Centre (NCSC) warns.The NCSC, which is part of the UK’s GCHQ intelligence agency, issued an alert this week to warn organizations that they may b
Publish At:2019-10-05 00:00 | Read:380 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Risk Ma

Researcher Shows How Adversaries Can Gather Intel on U.S. Critical Infrastructure

A researcher has used a free tool that he created and open source intelligence (OSINT) to demonstrate how easy it is for adversaries to gather intelligence on critical infrastructure in the United States.The researcher, known online as Wojciech, used his Kamerka tool to find industrial control systems (ICS) in the United States, map them to geographical loca
Publish At:2019-10-04 00:00 | Read:335 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Identity & Access Risk M

Perception vs. Reality in Federal Government Security Practices

Focusing on Data Security Controls Will Not Provide the Most Robust Protection Against Data BreachesSince the U.S. government is recognized as a superpower when it comes to cyber warfare, many observers also believe these capabilities extend to the security posture of its agencies and IT infrastructures. Especially because the federal government has develope
Publish At:2019-10-02 12:00 | Read:281 | Comments:0 | Tags:INDUSTRY INSIGHTS Risk Management

US Warns Italy Over China and 5G

US Secretary of State Mike Pompeo warned Italy Wednesday of China's "predatory approach" to trade and investment, but Rome insisted its special powers over 5G supply deals would protect it."China has a predatory approach in trade and investment" and represents a "mutual threat" to the two countries, Pompeo said during a joint press conference with Italy's Fo
Publish At:2019-10-02 12:00 | Read:318 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Wireless Security Risk Mana

Google Expands Use of Password Checkup Tool, Unveils New Privacy Features

Google on Wednesday announced that its Password Checkup tool has been added to the Account password manager, and the company has unveiled some new security and privacy features for YouTube, Maps and Assistant.Launched in February 2019 as an extension for Chrome, Password Checkup is designed to display a warning whenever users log in to a website with credent
Publish At:2019-10-02 12:00 | Read:284 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Email Security I

Senate Passes DHS Cyber Hunt and Incident Response Teams Act

The United States Senate recently passed the DHS Cyber Hunt and Incident Response Teams Act, a piece of legislation that instructs the DHS to help organizations protect themselves against cyber threats and respond to incidents.First introduced in 2018 by Senators Maggie Hassan (D-NH) and Rob Portman (R-OH) as the DHS Cyber Incident Response Teams Act of 2018
Publish At:2019-10-01 12:00 | Read:364 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Incident Response Ri

WebEx, Zoom Meetings Exposed to Snooping via Enumeration Attacks

Malicious actors may be able to easily access unprotected Cisco WebEx and Zoom meetings due to an API enumeration vulnerability, Cequence Security’s CQ Prime threat research team revealed on Tuesday.Cequence researchers discovered that the APIs for Cisco WebEx, Zoom and possibly other online conferencing products are vulnerable to enumeration attacks. The vu
Publish At:2019-10-01 12:00 | Read:220 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Identity & Access Risk Manag

Organizations Prefer Quick Technological Fix Over Deep-Rooted Cyber Resiliency: Report

The Marsh/Microsoft 2019 Global Risk Perception Survey is a follow-on to a similar survey published in February 2018 (conducted in 2017). SecurityWeek criticized the earlier survey results for not including a specific cybersecurity function among the respondents. There are arguments on both sides, since the survey seeks to understand the overall business pos
Publish At:2019-10-01 12:00 | Read:300 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management

New Anomali Tool Finds Threat Data in News, Blogs, Social Networks

Threat intelligence firm Anomali on Monday announced the launch of Lens, a new tool designed to make it easier for organizations to find and use threat data from a wide range of sources.Anomali Lens is part of the company’s Altitude solution, which also includes its flagship threat intelligence platform ThreatStream and Match, a breach detection platform tha
Publish At:2019-09-30 12:00 | Read:252 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Virus & Threats Ris

Vulnerability Management Firm Kenna Security Raises $48 Million

San Francisco-based vulnerability management solutions provider Kenna Security on Monday announced that it has raised $48 million in a Series D funding round, which brings the total raised by the company to $98 million.New investors Sorenson Capital and Citi Ventures, along with existing investors Bessemer Venture Partners, U.S. Venture Partners, Costanoa Ve
Publish At:2019-09-30 12:00 | Read:288 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management Vulnerabilities Manageme

GAO Says Electric Grid Cybersecurity Risks Only Partially Assessed

A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks.The report includes the findings of a recently conducted review of the cybersecurity of the national electric grid, which includes “the commercial electric power generation, transm
Publish At:2019-09-27 12:00 | Read:331 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Virus & Threats Complian


Share high-quality web security related articles with you:)


Tag Cloud