HackDig : Dig high-quality web security articles

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020. New research in this year’s report also reveals for the first time that 83% of organizations in the study have experienced more than one data br
Publish At:2022-07-27 05:13 | Read:337 | Comments:0 | Tags:Zero Trust Intelligence & Analytics Artificial Intelligence

Half-Year Review: Emerging Mobile Threats and Key Trends in 2022

As the saying goes, time is money. While this does remain true, I’d also argue data is money. The mobile phones we carry in our pockets have quickly come to represent our personal ATMs. We use our phones to make purchases, send money, and do banking. On the same note, we now also use our mobile devices to manage our personal and corporate data, the digital g
Publish At:2022-07-12 10:48 | Read:368 | Comments:0 | Tags:Mobile Malware Mobile Security Threat Research Mobile securi

ABCsoup: The Malicious Adware Extension with 350 Variants

What can ABCsoup do? Recently Zimperium discovered and began monitoring the growth of a wide range of malicious browser extensions with the same extension ID as that of Google Translate, deceiving users into believing that they have installed a legitimate extension. Similar to app spoofing and cloning, these malicious applications look legitimate, but undern
Publish At:2022-07-07 10:48 | Read:442 | Comments:0 | Tags:Mobile Malware Mobile Security Threat Research device mobile

Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine

Following ongoing research our team, IBM Security X-Force has uncovered evidence indicating that the Russia-based cybercriminal syndicate “Trickbot group” has been systematically attacking Ukraine since the Russian invasion — an unprecedented shift as the group had not previously targeted Ukraine. Between mid-April and mid-June of 2022 the
Publish At:2022-07-07 07:06 | Read:710 | Comments:0 | Tags:Intelligence & Analytics Malware Security Services Threat In

The C-Suite Is Optimistic About Ransomware. Are They Right?

The majority of C-suite executives are confident in their organization’s protection against ransomware attacks. At least, that’s what a recent research report from ISC2 shows. In fact, just 15% express a lack of confidence. Does this confidence take into account the nearly 53% rise in double extortion ransomware attacks between January and Febru
Publish At:2022-06-21 10:19 | Read:317 | Comments:0 | Tags:Risk Management Threat Research ransomware attacks Ransomwar

Mobile Banking Heists: The Emerging Threats and How to Respond

The landscape of modern banking and financial management has evolved with the rise of digital access to assets on a global scale. From payments to cryptocurrencies, banking to investments, the financial industry has turned the mobile phone into a personal ATM for each customer. But with this evolution and digital growth comes new threats to each customerR
Publish At:2022-06-02 19:22 | Read:993 | Comments:0 | Tags:App Security Financial Services Mobile Security Threat Resea

Black Basta Besting Your Network?

This post was written with contributions from Chris Caridi and Kat Weinberger. IBM Security X-Force has been tracking the activity of Black Basta, a new ransomware group that first appeared in April 2022. To date, this group has claimed attribution of 29 different victims across multiple industries using a double extortion strategy where the attackers not o
Publish At:2022-05-26 14:27 | Read:1014 | Comments:0 | Tags:Intelligence & Analytics Network Threat Hunting Threat Intel

ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups

IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. The results of this research, along with evidence gained from the disclosure of internal ITG23 chat logs (“Contileaks”), provide new
Publish At:2022-05-19 06:20 | Read:1109 | Comments:0 | Tags:Malware Security Services Threat Intelligence Threat Researc

X-Force Research Update: Top 10 Cybersecurity Vulnerabilities of 2021

From 2020 to 2021, there was a 33% increase in the number of reported incidents caused by vulnerability exploitation, according to the 2022 X-Force Threat Intelligence Index. A large percentage of these exploited vulnerabilities were newly discovered; in fact, four out of the top five vulnerabilities in 2021 were newer vulnerabilities. Vulnerability exploit
Publish At:2022-05-05 12:00 | Read:814 | Comments:0 | Tags:Software Vulnerabilities Application Security Threat Intelli

Hive0117 Continues Fileless Malware Delivery in Eastern Europe

Through continued research into the ongoing cyber activity throughout Eastern Europe, IBM Security X-Force identified a phishing email campaign by Hive0117, likely a financially motivated cybercriminal group, from February 2022, designed to deliver the fileless malware variant dubbed DarkWatchman. The campaign masquerades as official communications from the
Publish At:2022-04-26 10:09 | Read:1069 | Comments:0 | Tags:Malware Threat Intelligence Threat Research IBM X-Force Rese

Where Everything Old is New Again: Operational Technology and Ghost of Malware Past

!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"> This post was written with contributions from IBM Security’s Sameer Koranne and Elias Andre Carabaguiaz Gonzalez. Operational technology (OT) — the networks that control industrial control system processes — face a more complex challeng
Publish At:2022-04-13 06:13 | Read:2206 | Comments:0 | Tags:Malware Network Security Services Threat Research IBM X-Forc

The State of Browser Extension Malware

id="bsf_rt_marker">It is time for us to change how we think about malware. No longer is it limited to one specific operating system or device type. Like with phishing attacks, malware developers have been working on malware that can impact a broader range of systems to increase the number of potential victims of their malicious campaigns. Web browsers have
Publish At:2022-04-07 14:59 | Read:1538 | Comments:0 | Tags:Chromebooks Mobile Malware Mobile Security Threat Research m

The State of Mobile App Security: Key Takeaways from 2022 Threat Report

id="bsf_rt_marker">Over the last few years, a major shift has occurred in how we use mobile devices and apps. Fundamentally, we continue to use our smartphones more and more. In the process, mobile apps continue to collect more sensitive personal and corporate data, while at the same time, mobile apps continue to get more vulnerable. We’ve recently publish
Publish At:2022-03-31 14:58 | Read:801 | Comments:0 | Tags:App Security Mobile Security Threat Research app security mo

CaddyWiper: Third Wiper Malware Targeting Ukrainian Organizations

On March 1, 2022, ESET reported a third destructive data wiper variant used in attacks against Ukrainian organizations dubbed as CaddyWiper. CaddyWiper’s method of destruction is by overwriting file data with “NULL” values. This is the fourth sample of malware IBM Security X-Force has released public content for which has been reportedly t
Publish At:2022-03-15 18:00 | Read:1853 | Comments:0 | Tags:Malware Threat Intelligence Threat Research IBM X-Force Rese

2022 Global Mobile Threat Report: Key Insights on the State of Mobile Security

  What’s the mobile security landscape like today, how has it changed, and what can security teams expect over the course of 2022? To provide answers, we’ve recently published our 2022 Global Mobile Threat Report. This report provides a comprehensive look at the landscape and its evolution and explores how mobile threats and a modern security strategy d
Publish At:2022-03-14 07:06 | Read:2194 | Comments:0 | Tags:Mobile Security Threat Research Mobile security mobile threa

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud