HackDig : Dig high-quality web security articles for hackers

Looking at Big Threats Using Code Similarity. Part 1

Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. You can read more about KTAE in our official press release, or go directly to its info page on the Ka
Publish At:2020-06-09 08:07 | Read:196 | Comments:0 | Tags:Featured Security technologies APT Lazarus Malware Technolog

Kids on the Web in 2020

Technology is what is saving us from a complete change in the way of life in a world of a raging pandemic. It keeps the educational process going, relieves the shortage of human communication and helps us to live life as fully as possible given the isolation and social distancing. Many adults, and children too, have come to realize that the computer is not j
Publish At:2020-06-03 06:33 | Read:195 | Comments:0 | Tags:Featured Publications Parental control Security technology

SAS, sweet SAS

As you may already know from our social network posts, we have rescheduled the SAS 2020 conference for November 18-21 due to the COVID-19 pandemic and to ensure your safety. Though we still think that Barcelona is a great place to meet and it will not be a “real” SAS if we cannot hug, shake hands and touch beer glasses in that beautiful city, we
Publish At:2020-05-03 08:09 | Read:336 | Comments:0 | Tags:Events Featured Security conference Security technology

Defragging Security With a Platform Approach

Cybersecurity leaders and security teams are going through a tough phase. On one hand, cyberattacks are at an all-time high with 8.5 billion records breached in 2019 and ransomware attacks up 67 percent year-over-year in Q4 2019, according to the X-Force Threat Intelligence Index. On the other hand, security leaders are faced with the problem of security com
Publish At:2020-04-17 13:00 | Read:506 | Comments:0 | Tags:CISO Cloud Cloud Services Compliance Cyberattacks Data Prote

YARA webinar follow up

If you read my previous blogpost Hunting APTs with YARA then you probably know about the webinar we conducted on March 31, 2020, showcasing some of our experience in developing and using YARA rules for malware hunting. In case you missed the webinar – or if you attended and want to re-watch it – you can find the recording here: As requested by m
Publish At:2020-04-06 14:15 | Read:545 | Comments:0 | Tags:Events APT Malware Technologies Security technology Vulnerab

Effective Data Security Begins With a Strong Tech Foundation

Data is the engine of the modern economy. Whether it consists of customer data, intellectual property, market insights or financial information, these types of sensitive data enable the most successful businesses to thrive. It’s no surprise, then, that securing that critical data is increasingly a strategic priority for organizations around the globe.
Publish At:2020-03-31 08:26 | Read:427 | Comments:0 | Tags:CISO Data Protection Chief Information Officer (CIO) Chief I

Hunting APTs with YARA

For the past few years, we have been spreading our knowledge and experience of using YARA, often called a pattern matching swiss knife for malware researchers (and everyone else). Most of the time, this took the form of the Kaspersky training course titled, “Hunting APTs with YARA Like a GReAT Ninja”. The first YARA training session of that kind
Publish At:2020-03-18 12:30 | Read:825 | Comments:0 | Tags:Events APT Malware Technologies Security technology

Safeguarding Healthcare for the Future With Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all attacks last year. Th
Publish At:2020-03-11 08:47 | Read:785 | Comments:0 | Tags:Healthcare Identity & Access Access Management Advanced Pers

How a More Connected Approach Can Help With Threat Management

Threat management is a framework that is often used to evaluate and manage everything you can do to detect and respond to cyberthreats. It encompasses people, process and technology, and for effective threat management, all three should work together seamlessly. Of course, that’s easier said than done. When you look at just the technology piece of thre
Publish At:2020-03-06 11:10 | Read:622 | Comments:0 | Tags:Incident Response Risk Management Threat Hunting Threat Inte

Cybersecurity Research During the Coronavirus Outbreak and After

Virus outbreaks are always gruesome: people, animals or computer systems get infected within a short time. Of course, viruses spreading across our physical world always take priority over the virtual world. Nevertheless, everyone should keep doing their job, which includes all kinds of malware researchers, digital forensics experts and incident responders. A
Publish At:2020-02-20 08:02 | Read:641 | Comments:0 | Tags:Software digital forensics Linux Security technology Virus

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected more than 100 state and local governments, according to Recorded Future — and that’s just one threat vector. Municipalities are also at risk from insider threats, coordinated attacks and other perils. What is it about
Publish At:2020-02-17 18:22 | Read:649 | Comments:0 | Tags:Government Credit Card Data Cyberattacks Data Breaches Data

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:621 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

How Deepfakes Will Make Us Question Everything in 2020

We’ve written about deepfakes before, but there’s one overlooked side effect that must be brought to our attention: As the technology improves and becomes more commonplace, what’s stopping anyone from claiming that what they definitively said was the result of a deepfake? While watching a recent episode of The New York Times’ “T
Publish At:2020-02-09 10:30 | Read:427 | Comments:0 | Tags:Artificial Intelligence Identity & Access Risk Management Ad

Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly evolving. Security measures that worked in the past will not be effective today, and today’s security controls will not be effective tomorrow. Many factors contribute to this rapid pace of change. A
Publish At:2020-02-09 10:30 | Read:652 | Comments:0 | Tags:Artificial Intelligence Analysts Artificial Intelligence (AI

5G technology predictions 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions Corporate security prediction 2020 Cyberthreats to financial institutions 2020: Overview and predictions It is estimated that data will reach 175 zettabytes worldwide by 2025, up from 1.2 zettabytes in 2010, when 4G wa
Publish At:2019-12-03 06:05 | Read:1351 | Comments:0 | Tags:Kaspersky Security Bulletin Internet of Things Mobile securi


Share high-quality web security related articles with you:)