HackDig : Dig high-quality web security articles for hacker

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:283 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:387 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

WannaCry Ransomware Racing Around the World, Wreaking Havoc

This is a special rapid response blog to breaking news about the WannaCry ransomware attack that is now being seen in more than 100 countries. We’ll be updating our blog with additional news as we learn more.  “No x-rays/bloods/bleeps/phones/notes. This is unprecedented. It will be a miracle if no-one comes to harm.” This dramatic tweet from an Nationa
Publish At:2017-05-13 12:35 | Read:569 | Comments:0 | Tags:Breaking News Threats breach breaking news endpoint microsof

Zero-Day Vulnerability is a Zero-Sum Game

Late last week a new Microsoft Office vulnerability was discovered by McAfee; they discovered attacks exploiting this vulnerability back to late January 2017. This should raise substantial concern for anyone responsible for cyber security at their company or federal agency. Since January, every Windows-based MS Office machine was exposed to the worst type o
Publish At:2017-04-16 13:05 | Read:551 | Comments:0 | Tags:Breaking News Government Threats Malware McAfee Microsoft Of

Bromium, the Stuff Super Heroes Use

For any of you who were at one time in your youth a Super Hero, technology today might be a little reminiscent of that time. Unlike those childhood games, however, this is no game at all. In the world of technology the enemy engages us with weapons like phishing and malware. What is this new super-powered defense? It is called Bromium, not just protection b
Publish At:2017-04-16 13:05 | Read:467 | Comments:0 | Tags:End Users end user Endpoint Protection Security threat

Breaking News: “It’s a Very Large-Scale Espionage Operation”

A complex cybercrime spy ring has been revealed today. A China-based cyber gang is behind the effort. Countries targeted include Japan, UK, France and the United States. If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story
Publish At:2017-04-05 08:55 | Read:2381 | Comments:0 | Tags:Breaking News Threats browsing China click crime email Malwa

The Top 13 Information Security Conferences of 2017

2017 is finally here. You know what that means: another information security conference season is upon us. We couldn’t be more excited!Just like we did last year, we at The State of Security have assembled a list of the top 13 conferences in information security for 2017. We hope you’ll have the chance to attend at least one of these events this
Publish At:2017-01-11 12:55 | Read:962 | Comments:0 | Tags:Off Topic Conferences CTF hacking Information Security pente

Festive Phishing in the Workplace

It’s that most wonderful time of the year again – for cyber-criminals and all manner of online miscreants, that is. Whilst next-gen malware samples may be finding new and inventive ways of delivering their payloads, the tried and tested phishing scam isn’t going anywhere just yet. Especially during this distracting and emotive season when even the most vigil
Publish At:2016-12-13 17:55 | Read:1287 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data mitig

AtomBombing, a new threat to your Windows

A few days ago Tal Liberman, a security researcher from the company enSilo revealed a new code injection technique that affects all Windows versions up to Windows 10. Due to the nature of this technique it is unlikely that it can be patched. In this article I’d like to shed light on this attack, its consequences and what can be done in order to protect ours
Publish At:2016-11-04 13:35 | Read:788 | Comments:0 | Tags:Malware Mobile News atombombing companies highlighted Panda

Be careful with CryptoBit, the latest threat detected

A few days ago at PandaLabs, Panda Security’s anti-malware lab, we discovered a type of ransomware that we believe is extremely important to talk about, especially because of its novelty and its unique features. The name of this new ransomware is CryptoBit. If we compare it to what we’ve learned thus far from other ransomware, we can say that CryptoBit is a
Publish At:2016-04-20 23:10 | Read:924 | Comments:0 | Tags:Malware Panda Security cryptobit news Ransomware threat

Ponmocup – A giant hiding in the shadows

Ponmocup, first discovered in 2006 as Vundo or Virtumonde, is one of the most successful botnets of the past decade, in terms of spread and persistence. The reasons why this botnet is considered highly interesting are that it is sophisticated, underestimated and is currently largest in size and aimed at financial gain. This underestimated botnet is still in
Publish At:2015-12-13 12:05 | Read:1106 | Comments:0 | Tags:Blog botnet milicenso pirminay ponmocup report threat virtum

Threat Recap: Week of Dec 7th

Top 5 Week of Dec. 7 UAE Bank Hack In the last week, a major financial institution in the United Arab Emirates was hacked, with customer information being ransomed for a sum of nearly $3 million USD. The bank’s refusal to pay the significant ransom lead to the hacker releasing account information of nearly 500 customers, via Twitter. Although the Twitt
Publish At:2015-12-11 20:30 | Read:853 | Comments:0 | Tags:Malware Threat Research Breach SecurityNews threat

VERT Threat Alert: July 2015 Patch Tuesday Analysis

Today’s VERT Alert addresses 14 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-623 on Wednesday, July 15th.MS15-058SQL Server Elevation of Privilege VulnerabilityCVE-2015-1761SQL Server Remote Code Execution VulnerabilityCVE-2015-1762SQL Server Remote Code E
Publish At:2015-07-15 05:50 | Read:1498 | Comments:0 | Tags:Vulnerability Management Patch Tuesday threat VERT

The Floppies Won’t Eat Your Mouse

We heard tell of a mean ol’ venom on the street (CVE-2015-3456).  “Hey, give that back to Spidey.”   So we decided to have a look.  But we’re not talking about superheroes.  We’re talking about floppy.  Remember this fella? He seems bummed out.  That’s because there’s not much need for him anymore.  Or so we thought.  Let’s give it over to the expert: “Tha
Publish At:2015-05-14 17:25 | Read:1084 | Comments:0 | Tags:CVE-2015-3456 Exploits Exploit Threat Vulnerability

The ‘ABC’ of the ‘APT’

 The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new.Whilst these new outlined logical dangers do serve up a very real t
Publish At:2015-03-04 15:40 | Read:1108 | Comments:0 | Tags:Featured Articles APT Cyber Security threat

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud