HackDig : Dig high-quality web security articles

The Great Cybersecurity Resignation

In 2022, the buzz phrase of the year has to be “The Great Resignation”. What is it? It’s a term coined to describe the current rise in people leaving their employer to find work elsewhere.But people have always moved on, right? Of course they have. Staff retention rates have always been a target for most HR functions. But something is different in 2022. More
Publish At:2022-07-13 01:06 | Read:580 | Comments:0 | Tags:Connecting Security to the Business Featured Articles C-Suit

5 Linux malware families SMBs should protect themselves against

There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros to choose from, it’s (generally) free, and perhaps above all — it’s secure. The common wisdom goes that Linux malware is rare, and for the most part this is true. Thanks to its built-in security defenses, strict user privilege model, and transparen
Publish At:2022-06-08 13:00 | Read:523 | Comments:0 | Tags:Business botnet Linux malware ransomware rootkit SMB

Why MRG-Effitas matters to SMBs

When selecting the right cybersecurity vendor to protect their operations, small- and medium-sized businesses (SMBs) can lean on several third-party research organizations that analyze which cybersecurity products can best prevent, detect, and clean up various types of cyberattacks today. But these tests can sometimes assume a level of end-user complexity
Publish At:2022-05-16 12:59 | Read:1183 | Comments:0 | Tags:Malwarebytes news 360° Assessment Malwarebytes MITRE MRG-Eff

Why MITRE matters to SMBs

Running a small- to medium-sized business (SMB) requires expertise in everything, from marketing and sales to management and hiring, but in the ever-expanding list of executive responsibilities, one particular item demands attention: Cybersecurity. Cyberattacks can—and have—shuttered entire businesses. Cyberattacks can ruin reputations. Cyberattacks can l
Publish At:2022-04-25 09:30 | Read:1429 | Comments:0 | Tags:Business Alert Quality configuration changes MITRE MITRE ATT

Four SMB cybersecurity practices during geopolitical upheaval

Russia’s continued, weeklong invasion of Ukraine has altered the landscape of cybersecurity threats facing organizations both near and far from the physical threat of war. Disinformation is spreading and being actively fought. The old hacker group Anonymous promised “cyber war” against Russia. One ransomware group swore to launch retaliatory attacks for a
Publish At:2022-03-03 08:51 | Read:1052 | Comments:0 | Tags:Awareness 2fa cisa covid-19 covid-19 scams multi-factor auth

Samba patches critical vulnerability that allows remote code execution as root

Samba developers have patched a vulnerability that allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit. Samba is a free software re-implementation of the SMB networking protocol that provides file and print services for various Microsoft Windows clients and can integrate with a Micros
Publish At:2022-02-01 12:46 | Read:954 | Comments:0 | Tags:Exploits and vulnerabilities cve-2022-44142 CVSS Netatalk sa

Containment, Communication, and Remediation: The 3 Keys to a Breach Response

The number of U.S. data breaches reported in 2021 increased dramatically over the preceding year. As reported by the Identity Theft Resource Center (ITRC), there were 1,291 data breaches between January 1, 2021 and September 30, 2021. The volume beat out the 1,108 breaches detected over the course of Full Year (FY) 2020. It’s therefore not surprising that da
Publish At:2022-01-26 02:06 | Read:2332 | Comments:0 | Tags:IT Security and Data Protection breach communication contain

Purple Fox rootkit now bundled with Telegram installer

The Purple Fox rootkit is being spread as an installer for the popular Telegram instant messaging app for Windows, according to researchers. It’s not clear how the installer in this case was distributed, although it seems like at least some were delivered via email. Common distribution methods for this type of installer are phishing campaigns, forum
Publish At:2022-01-04 12:45 | Read:1193 | Comments:0 | Tags:Trojans brute force Purple Fox rootkit SMB telegram uac worm

What Are the Key Challenges for Cybersecurity Professionals Going into 2022?

Tripwire recently conducted a series of surveys and interviews to understand IT professionals who manage security for their company. The cybersecurity landscape is constantly changing, new challenges are rapidly emerging, and new threats have surfaced, especially throughout the pandemic. We were curious to know some of the struggles that security professiona
Publish At:2021-12-13 02:05 | Read:2170 | Comments:0 | Tags:IT Security and Data Protection cybersecurity Key Challenges

Windows 11: Registry Keys, SMB Protocol, and SystemInfo

Windows 11 was released on October 5, 2021. It has several new installation requirements including, most notably, Secure Boot and a Trusted Platform Module. These features can provide a more secure computing environment, but if you need to virtualize a Windows 11 environment, you will need virtualization software that supports this.Although I would normally
Publish At:2021-10-14 23:10 | Read:2417 | Comments:0 | Tags:Featured Articles VERT SMB Windows 10 Windows 11

LemonDuck no longer settles for breadcrumbs

LemonDuck has evolved from a Monero cryptominer into LemonCat, a Trojan that specializes in backdoor installation, credential and data theft, and malware delivery, according to the Microsoft 365 Defender Threat Intelligence Team, which explained their findings in a two-part story [1][2] on the Microsoft Security blog. LemonDuck Trojan.LemonDuck has al
Publish At:2021-07-30 13:57 | Read:1494 | Comments:0 | Tags:Botnets C&C cross-platform LemonCat LemonDuck LNK malspam pr

Security pros agree about threats—convincing everyone else is the problem

How about that Colonial Pipeline? As troubling as this event may be, for those of us working in the world of cybersecurity it can be hard to convince others to take dangers like this seriously—regardless of how real and immediate they are. “Sadly, the upper leadership team does not understand the stakes and why an investment is necessary to protec
Publish At:2021-06-04 14:15 | Read:1532 | Comments:0 | Tags:Malwarebytes news CISOs cybersecurity trust & confidence rep

Understanding the Cloud Security Challenges for SMBs

The events of 2020 didn’t prevent small- to mid-sized businesses (SMBs) from adopting the cloud. Impact Networking reported that SMBs’ overall cloud spending grew 6.3% between 2019 and 2020. Such growth is projected to lead more than a third (35%) of SMBs to annually spend between $600,000 and $1.2 million on public cloud services by the end of 2021, noted S
Publish At:2021-06-02 04:50 | Read:2033 | Comments:0 | Tags:Cloud cloud security configuration SMB security

Breaking free from the VirusTotal silo: Lock and Code S02E07

This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in using VirusTotal as the one source of truth when evaluating whether or not a cybersecurity tool actually works. It’s a practice that is surprisingly common. Weeks ago, Malwarebytes Labs released the SMB Cybersecurity Trust & C
Publish At:2021-04-26 14:04 | Read:1515 | Comments:0 | Tags:Podcast lock and code lock and code podcast small businesses

Malwarebytes releases SMB Cybersecurity Trust & Confidence Report 2021

What can we say about 2020 that hasn’t already been said? Beliefs were shaken. Values were questioned. Truths were tested. Then COVID happened and things really got crazy. The World Health Organization declared the coronavirus outbreak a global pandemic on March 12, 2020. That same day cybersecurity got flipped on its head.  Entire businesses had
Publish At:2021-04-15 11:44 | Read:1959 | Comments:0 | Tags:Malwarebytes news CISOs cybersecurity trust & confidence rep


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud