HackDig : Dig high-quality web security articles for hacker

The Edge is Near. Are You Ready?

Outpacing Your Security Capacity With Digital Innovation is a Formula for Disaster Digital transformation has largely been focused on expanding the network through the creation and integration of new edge computing environments. Internal projects, such as the virtualization of the data center, have now turned into the cloud edge through the addition of
Publish At:2020-01-16 12:00 | Read:229 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

Go Huawei: UK PM Challenges US Critics of China Firm

Prime Minister Boris Johnson on Tuesday challenged US opponents of Britain's potential decision to let China's Huawei telecoms giant develop its 5G network to come up with a better choice.Johnson's comments came one day after a US delegation arrived in London for a last-gasp push aimed at keeping its ally from signing up the private but controversial Chinese
Publish At:2020-01-14 22:15 | Read:157 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

US, UK Officials Meet as PM Johnson's Huawei Decision Nears

British and American officials are meeting as U.K. Prime Minister Boris Johnson's government prepares to decide on whether there's a future for Chinese equipment maker Huawei in the country's next-generation telecom networks, his spokesman said Monday.U.S. officials responsible for national security and telecommunications were meeting their counterparts in B
Publish At:2020-01-13 22:15 | Read:142 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

MITRE Releases ATT&CK Knowledge Base for Industrial Control Systems

MITRE on Tuesday announced the initial release of a version of its ATT&CK knowledge base that covers the tactics and techniques used by malicious actors when targeting industrial control systems (ICS).MITRE’s ATT&CK framework has been widely used by cybersecurity professionals to describe and classify attacker behavior and assess an organization’s ri
Publish At:2020-01-08 10:15 | Read:237 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Virus & Threats Risk Man

Facebook, Samsung, Ring Unveil New Privacy, Security Tools at CES 2020

Facebook, Samsung and Ring have unveiled new or improved privacy and security tools at the 2020 CES consumer electronics show taking place this week in Las Vegas.Facebook announced a revamped version of Privacy Checkup, a tool launched in 2014 in an effort to make it easier for users to manage the information they share on the social media network.The improv
Publish At:2020-01-07 12:00 | Read:144 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Application Security Compliance

Altering the Cyber Terrain and Shaping the Attacker Experience With Deception Technology

In my previous column, I wrote about how to “think like an attacker,” and one of the primary reasons for doing so is being able to leverage the attack surface to your advantage. With technology advancing at such a rapid pace, attackers have a larger playground, and cybersecurity is always in a catch-up/reactive mode. Moving applications and data to the cloud
Publish At:2019-12-17 10:15 | Read:296 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security Security Infrastructure

NordVPN Launches Bug Bounty Program

Virtual private network (VPN) services provider NordVPN on Monday announced the launch of a public bug bounty program on the HackerOne platform.The company says it will pay between $100 and $5,000 per vulnerability, but the payouts can be even higher “for especially clever or severe” weaknesses.The bug bounty program covers NordVPN websites (nordvpn.com and
Publish At:2019-12-09 22:15 | Read:334 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Security Infrastructure

Implementing Cyber Best Practices Requires a Security-First Approach

Competing in today's digital marketplace requires that organizations be cyber-savvy. End users and customers need organizations to understand things like web application development, digital shopping and other online transactions, the effective use of social media, and using digital tools to get and keep customers. And with all of this digital transformation
Publish At:2019-12-05 12:00 | Read:198 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Infrastructure

When it Comes to Securing Your Environment, Think Like an Attacker

Cybersecurity Teams Need Actionable Insight Into the Latest Techniques, Tactics and Procedures Being Used by Cyber Adversaries We will soon be entering a new decade of the cybersecurity battle, but many of the same challenges remain. Organizations continue to face threats from all angles, security postures haven’t evolved to be more predictive and proac
Publish At:2019-12-03 22:15 | Read:228 | Comments:0 | Tags:INDUSTRY INSIGHTS Network Security NEWS & INDUSTRY Secur

Random Acts of Security...or Not?

Adversaries Know Our Security Infrastructure is Fragmented and Take Advantage of Blind Spots to Stay Below the RadarApproximately 30 years ago, Dr. Persi Diaconis discovered that it takes seven shuffles to mix a deck of cards thoroughly so that the order of the cards is random. Since then, others have continued this research and now find the number of t
Publish At:2019-12-02 22:15 | Read:244 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Infrastructure

Attack Simulation Firm Cymulate Raises $15 Million

Israel-based cybersecurity startup Cymulate announced on Tuesday that it has raised $15 million in a Series B funding round led by Vertex Growth Fund.Founded by Eyal Wachsman and Avihai Bar Yosef, the company offers a cloud-based Breach and Attack Simulation (BAS) platform that helps organizations test their security controls by running thousands of attack s
Publish At:2019-11-26 12:00 | Read:363 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

Threat Intelligence Firm IntSights Raises $30 Million

Israel-born cyber threat intelligence firm Intsights announced this week that it has raised $30 million in a Series D funding round, bringing the total amount raised by the company to more than $70 million. Intsights is predicated on the idea that effective defense begins before an attack is launched. By definition, most traditional security controls ar
Publish At:2019-11-22 00:00 | Read:225 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

Microsoft Will Bring DNS Over HTTPS (DoH) to Windows

Microsoft this week revealed plans to adopt DNS over HTTPS (DoH) in Windows 10 in an attempt to keep user traffic as private as possible.Already set to arrive in Chrome and Firefox, DoH support in Windows means encrypted DNS queries, which essentially closes plain-text domain name transmissions in common web traffic and should result in a more secure overall
Publish At:2019-11-19 22:15 | Read:422 | Comments:0 | Tags:NEWS & INDUSTRY Data Protection Security Infrastructure

U.S. Proposes Cutting Off Funds for Chinese Telecom Equipment

U.S. regulators have proposed cutting off funding for Chinese equipment in U.S. telecommunications networks, citing security threats.The Federal Communications Commission will vote next month on a proposal to bar telecom companies from using government subsidies to pay for networking equipment from Huawei and ZTE. The move mostly affects small, rural compani
Publish At:2019-10-28 22:15 | Read:406 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

DDoS Attack Hits Amazon Web Services

Amazon Web Services (AWS) customers experienced service interruptions yesterday as the company struggled to fight off a distributed denial-of-service (DDoS) attack.As part of such an assault, attackers attempt to flood the target with traffic, which would eventually result in the service being unreachable.While customers were complaining of their inability t
Publish At:2019-10-24 10:15 | Read:407 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Incident Response Cloud


Share high-quality web security related articles with you:)


Tag Cloud