HackDig : Dig high-quality web security articles for hackers

NSA Publishes Recommendations on Securing IPsec VPNs

The National Security Agency (NSA) has published a series of recommendations on how to properly configure IP Security (IPsec) Virtual Private Networks (VPNs).Used within organizations of all sizes for remote connection to assets and for telework, VPNs can deliver the expected level of security if strong cryptography is employed and if admins perform regular
Publish At:2020-07-06 11:32 | Read:73 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Risk Management Se

Threat Hunting Firm Hunters Raises $15 Million in Series A Round

Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million.The company plans to use the money to scale its solution to help identify attacks in the cloud, on the network, and on endpoints. The funds will allow Hunters to invest further in machine
Publish At:2020-06-30 12:42 | Read:58 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Virus & Threats Clo

Microsoft Defender ATP Gets UEFI Scanner

Microsoft has extended the protection capabilities of Microsoft Defender Advanced Threat Protection (ATP) with the addition of a Unified Extensible Firmware Interface (UEFI) scanner.With hardware and firmware-level attacks increasing in frequency over the past several years, Microsoft has decided to expand its security solution’s capabilities to ensure it ca
Publish At:2020-06-18 14:15 | Read:148 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Defending Your Budget: How to Show ROI of Cybersecurity Investments

For those of us who work in cybersecurity, the term “Return on Investment” (ROI) has no doubt made for awkward conversations. The solutions we work with have a return, but one that is commonly only evident during a malware attack or after a data breach has been thwarted. Like testing parachutes or evaluating new safety harnesses, performing a live demon
Publish At:2020-06-18 14:15 | Read:133 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Infrastructure Management & S

Senator Raises Concerns About Ability of U.S. Intelligence to Protect Secrets

Senator Ron Wyden has raised concerns about the ability of U.S. intelligence agencies to protect what he describes as “some of the nation’s most sensitive secrets,” and he has sent a letter to the director of national intelligence asking for information on plans to improve cybersecurity.Sen. Wyden sent the letter to Director of National Intelligence John Rat
Publish At:2020-06-17 08:07 | Read:151 | Comments:0 | Tags:NEWS & INDUSTRY Risk Management Data Protection Security

CIA Unit That Crafts Hacking Tools Didn't Protect Itself

A specialized CIA unit that developed hacking tools and cyber weapons didn’t do enough to protect its own operations and wasn't prepared to respond when its secrets were exposed, according to an internal report prepared after the worst data loss in the intelligence agency’s history."These shortcomings were emblematic of a culture that evolved over years that
Publish At:2020-06-16 16:40 | Read:126 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Inciden

T-Mobile Outage Mistaken for Massive DDoS Attack on U.S.

Wireless carrier T-Mobile on Monday suffered a major outage in the United States that impacted service at other carriers as well, and it ended up being reported as a “massive” distributed denial of service (DDoS) attack.The incident started around noon and continued to impact T-Mobile’s network throughout the day, leaving millions without voice and text serv
Publish At:2020-06-16 14:11 | Read:196 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Incident Response Mo

Vectra Targets SOCs With Microsoft Defender ATP, Azure Sentinel Integration

Vectra Integrates Cognito with Microsoft Defender ATP and Azure Sentinel to Form a SOC Visibility TriadSan Jose, Calif-based threat detection firm Vectra has integrated its network threat detection and response (NDR) Cognito platform with Microsoft Defender and Microsoft Azure Sentinel to deliver Gartner's concept of the SOC Visibility Triad.Gartner introduc
Publish At:2020-06-09 10:56 | Read:181 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Security Infrastructure

US Seeks to Cut Off China's Huawei From Global Chip Suppliers

US officials moved Friday to cut off Chinese tech giant Huawei from global chipmakers, ramping up sanctions on the company seen by Washington as a national security risk.The Commerce Department said it was broadening its sanctions enforcement to include semiconductor designs that are developed using US software and technology.Officials said Huawei had been c
Publish At:2020-05-18 13:55 | Read:340 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

U.S. Restriction on Chipmakers Deals Critical Blow to Huawei

The latest U.S. sanctions on tech giant Huawei threaten to devastate the company and escalate a feud with China that could disrupt technology industries worldwide.Huawei Technologies Ltd. is one of the biggest makers of smartphones and network equipment, but that $123 billion-a-year business is in jeopardy after Washington announced further restrictions on u
Publish At:2020-05-18 13:54 | Read:297 | Comments:0 | Tags:NEWS & INDUSTRY Security Infrastructure

GAO Criticizes Pentagon Over Cyber Hygiene Efforts

A report published this week by the U.S. Government Accountability Office (GAO) shows that the Pentagon’s cyber hygiene initiatives have not been completed and in some cases no one is keeping track of their progress.The GAO has reviewed three of the Department of Defense’s initiatives aimed at improving the security of its networks, including the 2015 Cybers
Publish At:2020-04-15 10:07 | Read:463 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Risk Management Trainin

Why You Need to Put Your Security to the Test

We’re all familiar with the expression ‘Trust but verify.’ Unfortunately, when it relates to protecting their networks, most organizations rely on trust but don’t verify that their security solutions are working as they should. A recent survey (PDF) of security operations effectiveness found that just 37 percent of security professionals have hard evidence t
Publish At:2020-04-13 12:05 | Read:414 | Comments:0 | Tags:INDUSTRY INSIGHTS Security Architecture Security Infrastruct

Free Security Tools, Resources Offered During Coronavirus Outbreak

Many companies are offering free cybersecurity tools and resources to help organizations during the COVID-19 coronavirus outbreak.Tens of companies have announced over the past weeks that they are offering free tools and services to organizations impacted by the pandemic. However, some experts have cautioned about these offers.“A word of caution to businesse
Publish At:2020-04-07 18:51 | Read:717 | Comments:0 | Tags:Endpoint Security Mobile Security Network Security NEWS &

Russian Telco Hijacked Internet Traffic of Major Networks - Accident or Malicious Action?

A huge BGP hijack by Russian state telecommunications provider Rostelecom diverted the traffic from more than 200 networks - including Google, Amazon, Facebook and Cloudflare - to Russian servers on April 1. It may have been accidental, it may not.Internet traffic routes are managed by the Border Gateway Protocol (BGP), which controls the way in wh
Publish At:2020-04-07 11:09 | Read:318 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Security Infrastructure

Microsoft Launches Free Zero Trust Assessment Tool

Microsoft last week announced the availability of a tool designed to help organizations see where they are in their journey to implement a zero trust security model.Nupur Goyal, senior product marketing manager at Microsoft, told SecurityWeek that the tool is free and available to anyone.“Our assessment tool will help orgs assess readiness across identities,
Publish At:2020-04-06 15:56 | Read:386 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Security Architect


Share high-quality web security related articles with you:)