HackDig : Dig high-quality web security articles for hackers

Building A Threat Identification Program to Better Manage Risk: The Key Pillars

Often, in the world of information security and risk management, the question facing threat intelligence teams is amidst this sea of vulnerability disclosures, which ones matter the most to my organization? Which can impact us the most? And, how do I best explain threats to internal stakeholders in a way that helps minimize risk? Reducing risk through prope
Publish At:2020-10-29 15:28 | Read:184 | Comments:0 | Tags:Threat Intelligence Security Operations Center (SOC)

Threat Analysis: How the Rapid Evolution of Reporting Can Change Security

With the advancements in data reporting gleaned from security information and event management (SIEM) tools and adjacent solutions, every security team today can face information overload and paralysis. To gain clarity within this murk, the practice of threat analysis has emerged and continues to evolve with time. With it, security professionals can fi
Publish At:2020-10-29 15:28 | Read:210 | Comments:0 | Tags:Security Intelligence & Analytics Threat Hunting Threat Inte

Reaching Strategic Outcomes With A Managed Detection and Response Service Provider: Part 1

This is the first in a five-part blog series on Managed Detection and Response as it drives strategic security outcomes for businesses. If there’s one thing the past decade has shown us, it’s that change happens faster than expected. Looking across the modern enterprise, we’ve seen applications become more modular and containerized and dat
Publish At:2020-10-29 03:46 | Read:220 | Comments:0 | Tags:Security Intelligence & Analytics Security Services Threat I

Are Bug Bounty Programs Worth It?

Bug bounty programs are on the rise, and participating security researchers earned big bucks as a result. According to a report released by HackerOne in February 2020, hackers had collectively earned approximately $40 million from those programs in 2019. This amount is nearly equal to the bounty totals hackers received for all preceding years combined. In &
Publish At:2020-10-12 10:28 | Read:232 | Comments:0 | Tags:Risk Management Threat Hunting Threat Intelligence Bug Bount

Digital Risk Protection vs. Threat Intelligence

<div> Digital Risk Protection (DRP) continues to gain momentum and attention among CISOs and security professionals. DRP, an operational security function once classified under Threat Intelligence (TI), has been elevated by the Gartner Hype Cycle and other analyst research as an emerging security function that security teams rely on to address multip
Publish At:2020-10-09 14:40 | Read:270 | Comments:0 | Tags:Threat Intelligence Digital Risk Protection DRP

How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start

A thorough cybersecurity threat intelligence team can turn a threat into a tool for future protection. Their job is to conduct background research on threat groups’ motivations and capabilities. This way, the intelligence team can be ready to protect an organization with even greater knowledge in the future. Strong cybersecurity threat intelligence ab
Publish At:2020-10-09 12:16 | Read:256 | Comments:0 | Tags:Security Intelligence & Analytics Threat Intelligence Cybers

Thinking Outside the Dox: What IT Security Can Learn From Doxing

Doxing is rightfully regarded as a dangerous threat, potentially exposing personal information where it shouldn’t be. But, defenses derived from doxing may strengthen corporate cybersecurity at scale.  Doxing is the dark side to widespread data dispersal and discovery. Data is leveraged to harm individuals or organizations, often as retaliation f
Publish At:2020-10-06 10:10 | Read:278 | Comments:0 | Tags:Data Protection Threat Intelligence Data Data Breach Persona

Ransomware 2020: Attack Trends Affecting Organizations Worldwide

Ransomware is one of the most intractable — and common — threats facing organizations across all industries and geographies. And, incidents of ransomware attacks continue to rise. Meanwhile, ransomware threat actors are adjusting their attack model to adapt to improvements that organizations are making to recover from these attacks. As of Septem
Publish At:2020-09-30 12:45 | Read:271 | Comments:0 | Tags:Advanced Threats Incident Response Threat Intelligence IBM X

Key Considerations When Selecting a Web Classification Vendor

Reading Time: ~ 4 min. Since launching our web classification service in 2006, we’ve seen tremendous interest in our threat and web classification services, along with an evolution of the types and sizes of cybersecurity vendors and service providers looking to integrate this type of curated data into their product or service. Over the years, we’ve had the g
Publish At:2020-09-16 19:21 | Read:341 | Comments:0 | Tags:Business + Partners Threat Intelligence threat intelligence

Incident Response: 5 Steps to Prevent False Positives

False positive alerts in your threat intel platform can leave your team scrambling. It’s like driving to the wrong address. You reach a place, but also waste time you could have used at your intended destination. For security teams, knowing how to screen for false positives saves time and makes the team more efficient at addressing real threats. Learn
Publish At:2020-09-04 08:13 | Read:385 | Comments:0 | Tags:Threat Hunting Threat Intelligence Threat Research False Pos

SOC 2.0: A Guide to Building a Strong Security Ops Team

In a security operations center (SOC), your cybersecurity tools are only as good as the people using them and your SOC’s culture. What are the critical SOC roles? What qualities should you look for when hiring for them? And, what should you expect from a cybersecurity career? Learn more about why IBM was selected as a Global and European Leader in Man
Publish At:2020-09-02 17:10 | Read:466 | Comments:0 | Tags:Incident Response Security Intelligence & Analytics Security

New Vulnerability Could Put IoT Devices at Risk

Society relies so heavily on technology that the number of internet connected devices used globally is predicted to grow to 55.9 billion by 2025. Many of these devices span parts of Industrial Control Systems (ICS) that impact the physical world, assist us in our daily lives at home and monitor and automate everything from energy usage to machine maintenanc
Publish At:2020-08-19 09:12 | Read:338 | Comments:0 | Tags:Security Services Software & App Vulnerabilities Threat Inte

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts security incidents can have on organizations, with histo
Publish At:2020-07-29 08:52 | Read:449 | Comments:0 | Tags:Data Protection Threat Intelligence Threat Research Cost of

Aviation Can Anticipate an Increase in State-Sponsored Activity

The combination of lockdown measures, travel restrictions and stalling demand brought on by COVID-19 has caused an unprecedented collapse in the global air transport industry. Facing a projected loss of $84.3 billion in revenue and 32 million aviation-related jobs worldwide, nations are scrambling to provide much-needed financial support to sustain domestic
Publish At:2020-07-28 17:26 | Read:439 | Comments:0 | Tags:Advanced Threats Threat Research X-Force IRIS Incident Respo

Darknet Cybersecurity: How Finance Institutions Can Defend Themselves

Financial firms continue to move to digital-first deployments, as retail branches close, and people shift to remote work. This shift makes understanding and preventing even common darknet, or dark web, threats a priority. Financial cybersecurity investment institutions need to understand what the dark web is, provide their security teams with the tools to ex
Publish At:2020-07-28 17:26 | Read:522 | Comments:0 | Tags:Advanced Threats Data Protection Identity & Access Threat In

Tools