HackDig : Dig high-quality web security articles for hackers

Top 9 free security training tools

Cybersecurity training is one of the best defenses against cyber attacks targeting organizations and individuals alike. Although security training is a tried-and-true defense against cyber attacks and data breaches, security training is not one-size-fits all. Every organization faces unique threats based on their industry, cybersecurity tools and secur
Publish At:2020-07-07 11:43 | Read:103 | Comments:0 | Tags:Security Awareness general security phishing security awaren

Adventures in Phishing Email Analysis

Opening Phishing attacks are a daily threat to all organizations and unfortunately, they are one of the hardest threats to protect against. No matter how many defensive layers an organization has put in place following best practice defense-in-depth design, it only takes one (1) user to click on that malicious link or open that weaponized attached documen
Publish At:2020-06-18 10:09 | Read:126 | Comments:0 | Tags:Incident Response Incident Response & Forensics Penetration

Sextortionists Using Social Engineering Tactics to Collect Victims’ Data

Security researchers observed sextortionists leveraging social engineering techniques to steal their victims’ personal information.SANS’ Internet Storm Center (ISC) discovered that sextortionists had begun creating profiles for young women on dating websites. They used those profiles and the stated interest of finding “good times” to
Publish At:2020-06-16 16:30 | Read:164 | Comments:0 | Tags:IT Security and Data Protection Latest Security News data se

Multifactor Authentication: The Next Battleground

X-Force Incident Response and Intelligence Services (IRIS) has responded to multiple security incidents where multifactor authentication (MFA) was not implemented—but where implementing MFA might have significantly reduced the impact of the incident. Such incidents have even included destructive malware attacks, resulting in millions of dollars in losses and
Publish At:2020-06-11 10:22 | Read:123 | Comments:0 | Tags:Identity & Access Threat Intelligence X-Force IRIS IBM X-For

Coronavirus campaigns lead to surge in malware threats, Labs report finds

In the first three months of 2020, as the world clamped down to limit coronavirus, cyber threats ramped up. Our latest, special edition for our quarterly CTNT report focuses on recent, increased malware threats which all have one, big thing in common—using coronavirus as a lure. Our report, “Cybercrime tactics and techniques: Attack on home base,” analyze
Publish At:2020-06-01 13:35 | Read:255 | Comments:0 | Tags:Cybercrime Malware Reports Scams Social engineering Threat a

Spam and phishing in Q1 2020

Quarterly highlights Don’t get burned Burning Man is one of the most eagerly awaited events among fans of spectacular performance and installation art. The main obstacle to attending is the price of admission: a standard ticket will set you back $475, the number is limited, and the buying process is a challenge all by itself (there are several stages,
Publish At:2020-05-26 08:14 | Read:208 | Comments:0 | Tags:Featured Spam and phishing reports Malicious spam Malware De

A Beginner’s Guide to Staying Safe/Anonymous Online

What is OSINT? It is probably safe to assume you have heard of OSINT at some point (Open Source INTelligence). However, if you have not, it can very generally be described as the collection and analysis of data gathered from publicly accessible sources. People who perform OSINT have a wide variety of sources they can pull from and many different technique
Publish At:2020-05-24 07:53 | Read:196 | Comments:0 | Tags:Security Testing & Analysis Social Engineering

New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

Since the World Health Organization (WHO) declared the COVID-19 outbreak a pandemic on March 11, IBM X-Force has observed a more than 6,000 percent increase in COVID-19-related spam, with lures ranging the full gamut of challenges and concerns facing individuals — from phishing emails impersonating the Small Business Administration (SBA) and the WHO to U.S.
Publish At:2020-05-03 08:13 | Read:299 | Comments:0 | Tags:Advanced Threats Banking & Financial Services Fraud Protecti

SBA Spoofed in COVID-19 Spam to Deliver Remcos RAT

Between late March and mid-April 2020, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a phishing campaign targeting small businesses that appears to originate from the U.S. Government Small Business Administration (SBA.gov). The emails, which contain subjects and attachments related to the need for small businesses to apply for disa
Publish At:2020-05-03 08:13 | Read:499 | Comments:0 | Tags:Government Malware Threat Hunting Credentials Theft Email IB

TrickBot Campaigns Targeting Users via Department of Labor FMLA Spam

IBM X-Force monitors billions of spam emails a year, mapping trending, malicious campaigns and their origins. Recent analysis from our spam traps uncovered a new Trickbot campaign that currently targets email recipients with fake messages purporting to come from the U.S. Department of Labor (DoL). The spam leverages the Family and Medical Leave Act (FMLA), w
Publish At:2020-05-03 08:13 | Read:436 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Cybercrime Fraud

Finding Zoom Meeting Details in the Wild

The popular web conference platform Zoom has been in the storm for a few weeks. With the COVID19 pandemic, more and more people are working from home and the demand for web conference tools has been growing. Vulnerabilities have been discovered in the Zoom client and, based on the fact that meetings were not properly secured, a new type of attack was also de
Publish At:2020-04-18 07:23 | Read:489 | Comments:0 | Tags:Business Privacy Security Social Engineering OSInt Webcast W

Spam and phishing in 2019

Figures of the year The share of spam in mail traffic was 56.51%, which is 4.03 p.p. more than in 2018. The biggest source of spam this year was China (21.26%). 44% of spam e-mails were less than 2 KB in size. Malicious spam was detected most commonly with the Exploit.MSOffice.CVE-2017-11882 verdict. The Anti-Phishing system was triggered 467,188,119 times.
Publish At:2020-04-08 07:25 | Read:648 | Comments:0 | Tags:Featured Spam and phishing reports Malicious spam Malware De

Zeus Sphinx Trojan Awakens Amidst Coronavirus Spam Frenzy

The recent months have created a new reality in the world as the novel Coronavirus pandemic spread from country to country raising concerns among people everywhere. With spammers and malware distributors already being accustomed to riding trending news, the COVID-19 theme has been exploited thoroughly by a large variety of spam and malspam campaigns. It appe
Publish At:2020-03-30 02:05 | Read:565 | Comments:0 | Tags:Malware Threat Intelligence Banking Malware Banking Trojan C

Fake “Corona Antivirus” distributes BlackNET remote administration tool

Scammers and malware authors are taking advantage of the coronavirus crisis in full swing. We have seen a number of spam campaigns using COVID-19 as a lure to trick people into installing a variety of malware, but especially data stealers. As more of us work from home, the need to secure your computer, especially if you are connecting to your company̵
Publish At:2020-03-23 17:03 | Read:513 | Comments:0 | Tags:Social engineering Threat analysis antivirus botnet coronavi

7 Spring Cleaning Tasks to Improve Data Security

This year, March 19 ushered in spring in the Northern Hemisphere — the first time since 1896 that the season has started so early. So why not take advantage of the season’s early arrival to do some spring cleaning, not only of your physical space, but of your data and systems, too? Digital spring cleaning can make your life easier and dramatically impr
Publish At:2020-03-20 10:40 | Read:542 | Comments:0 | Tags:Data Protection Mobile Security Application Security Cloud C

Announce

Share high-quality web security related articles with you:)

Tools