HackDig : Dig high-quality web security articles for hackers

MITRE Introduces 'Shield' Defense Knowledge Base

The MITRE Corporation has taken the wraps off a knowledge base of common techniques and tactics that defenders can use to ensure their networks and assets are kept secure.Called MITRE Shield, the publicly available, free resource is aimed at cyber-experts looking to engage an active cyber defense and, similarly with MITRE ATT&CK, presents a series of act
Publish At:2020-08-25 15:55 | Read:213 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture Management & S

The Integration Imperative for Security Vendors

Integration is Key to Bringing Security Teams, Processes and Technology TogetherI’m going to go out on a limb here and say that if you’re reading this article, chances are you’re into technology. At home, this may show up in the type of sound system you have or home automation solution. In either case, you have probably done extensive research and devised a
Publish At:2020-08-06 12:40 | Read:179 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Architecture Management & Str

Reviving Cybersecurity Innovation with Experience at the Forefront

Take another look at the title of this article. Do you find it to be a surprising statement? Cybersecurity innovation is not quite at the stage where it needs resuscitation, still, the last few months have demonstrated the need for change. As we move forward, the changing workplace environment is certainly building the case for innovation.At a recent virtual
Publish At:2020-08-04 12:35 | Read:207 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Architecture

Microsoft Adds New Data Corruption Preventions to Windows

Microsoft this week announced Kernel Data Protection (KDP), new technology that aims to protect the Windows kernel and drivers from data corruption attacks.Such attacks can result in modifications to system security policies, privilege escalation, and security attestation tampering, among others, and Microsoft’s KDP aims to prevent them through virtualizatio
Publish At:2020-07-09 12:54 | Read:380 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture Data Protection Se

Apple Acquires Device Management Company Fleetsmith

Apple has acquired Fleetsmith, a San Francisco-based company that specializes in solutions designed to help organizations manage the Apple devices used by their employees.Fleetsmith’s enterprise device management solution automates setup, patching, intelligence and security for Macs, iPhones, iPads and Apple TV devices.“We’re thrilled to join Apple. Our shar
Publish At:2020-06-25 09:09 | Read:391 | Comments:0 | Tags:Mobile Security Network Security NEWS & INDUSTRY Securit

Microsoft Defender ATP Gets UEFI Scanner

Microsoft has extended the protection capabilities of Microsoft Defender Advanced Threat Protection (ATP) with the addition of a Unified Extensible Firmware Interface (UEFI) scanner.With hardware and firmware-level attacks increasing in frequency over the past several years, Microsoft has decided to expand its security solution’s capabilities to ensure it ca
Publish At:2020-06-18 14:15 | Read:342 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

New Security Tech in Intel CPUs Protects Systems Against Malware Attacks

Intel on Monday unveiled a new security technology for its processors that will help protect systems against attack methods commonly used by malware.The new Control-Flow Enforcement Technology (CET), which is built into the hardware microarchitecture, will initially be available in the upcoming Tiger Lake mobile processors, but the tech giant plans on includ
Publish At:2020-06-15 13:39 | Read:312 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Ap

Zoom Not Offering End-to-End Encryption to Free Users to Help Law Enforcement

Zoom’s chief executive revealed on Tuesday that free users will not be offered end-to-end encryption as the company wants to assist the FBI and local law enforcement in their investigations.Zoom’s popularity has increased significantly since the start of the COVID-19 pandemic due to many people being forced to work and study from home. This popularity has al
Publish At:2020-06-03 15:57 | Read:472 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Risk Management Security Archite

Why You Need to Put Your Security to the Test

We’re all familiar with the expression ‘Trust but verify.’ Unfortunately, when it relates to protecting their networks, most organizations rely on trust but don’t verify that their security solutions are working as they should. A recent survey (PDF) of security operations effectiveness found that just 37 percent of security professionals have hard evidence t
Publish At:2020-04-13 12:05 | Read:579 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Architecture Security Infrastruct

Microsoft Launches Free Zero Trust Assessment Tool

Microsoft last week announced the availability of a tool designed to help organizations see where they are in their journey to implement a zero trust security model.Nupur Goyal, senior product marketing manager at Microsoft, told SecurityWeek that the tool is free and available to anyone.“Our assessment tool will help orgs assess readiness across identities,
Publish At:2020-04-06 15:56 | Read:615 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Security Architect

Microsoft Trials Election Security Solution in Wisconsin

Microsoft representatives are in Fulton, Wisconsin, on Tuesday to conduct the first real-world trials for ElectionGuard, the company’s open source election security solution.Introduced in May 2019, the free software development kit (SDK) was created in collaboration with Galois, aiming to provide end-to-end verification of elections. Moreover, the tool opens
Publish At:2020-02-18 12:14 | Read:673 | Comments:0 | Tags:NEWS & INDUSTRY Application Security Audits Security Arc

Firefox 74 Will Disable TLS 1.0 and TLS 1.1 by Default

Beginning March, when Firefox 74 is set to arrive in the release channel, Mozilla will disable older Transport Layer Security (TLS) protocol versions as default options for secure connections.An improvement over the Secure Sockets Layer (SSL) protocol, TLS is meant to improve the security of the Web, but flaws and weaknesses in older iterations, specifically
Publish At:2020-02-11 11:26 | Read:704 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture Data Protection Ma

Devices Still Vulnerable to DMA Attacks Despite Protections

Many devices, including ones often found in enterprise environments, are likely still vulnerable to direct memory access (DMA) attacks, despite the fact that hardware and software vendors have implemented protections that should prevent such attacks, firmware security company Eclypsium said on Thursday.DMA is designed to allow hardware components or peripher
Publish At:2020-01-30 10:15 | Read:890 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Evolution of OpenSSL Security After Heartbleed

OpenSSL has evolved a great deal in terms of security since the disclosure of the Heartbleed vulnerability back in 2014.OpenSSL, an open source library that implements the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols, is widely used by organizations to protect communications.In April 2014, the world learned that OpenSSL was affecte
Publish At:2019-12-26 10:15 | Read:1084 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Audits Identity & Access Sec

Tips to Help MSSPs Choose a Threat Intelligence Partner

As small and medium-sized businesses (SMBs) increasingly recognize that a reactive security posture is no longer sufficient for protecting their networks, managed security service providers (MSSPs) that cater to SMBs face both an immense opportunity and a considerable challenge.The opportunity is for MSSPs to harness the growing demand among SMBs for proacti
Publish At:2019-12-16 12:00 | Read:1063 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Architecture


Tag Cloud