HackDig : Dig high-quality web security articles for hackers

IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain

At the onset of the COVID-19 pandemic, IBM Security X-Force created a threat intelligence task force dedicated to tracking down COVID-19 cyber threats against organizations that are keeping the vaccine supply chain moving. As part of these efforts, our team recently uncovered a global phishing campaign targeting organizations associated with a COVID-19
Publish At:2020-12-03 10:05 | Read:345 | Comments:0 | Tags:Government Healthcare Threat Research Phishing Phishing Emai

WannaCry: How the Widespread Ransomware Changed Cybersecurity

If I had polled cybersecurity experts on their way to work on May 12, 2017, most of them would have said they knew a major cybersecurity event loomed. Yet, on that day no one expected that they were walking into the perfect storm — in the form of WannaCry ransomware, the most damaging cyberattack to date — when they traveled by car, train or fer
Publish At:2020-10-28 16:04 | Read:635 | Comments:0 | Tags:Data Protection Fraud Protection Identity & Access Incident

3 Biggest Factors in Data Breach Costs and How To Reduce Them

The cost of a data breach has increased slightly in the last six years on average. Costs are up 10% since 2014 to $3.86 million, according to the annual Cost of a Data Breach Report, published by IBM Security and based on research conducted by the Ponemon Institute. Three areas in particular proved to have the biggest cost impact for organizations in the st
Publish At:2020-09-30 12:45 | Read:571 | Comments:0 | Tags:Data Protection Incident Response Threat Research Cost of a

A New Botnet Attack Just Mozied Into Town

A relatively new player in the threat arena, the Mozi botnet, has spiked among Internet of things (IoT) devices, IBM X-Force has discovered. This malware has been active since late 2019 and has code overlap with Mirai and its variants. Mozi accounted for nearly 90% of the observed IoT network traffic from October 2019 through June 2020. This startling takeo
Publish At:2020-09-17 09:00 | Read:511 | Comments:0 | Tags:Incident Response Malware Threat Research Botnets Internet o

Incident Response: 5 Steps to Prevent False Positives

False positive alerts in your threat intel platform can leave your team scrambling. It’s like driving to the wrong address. You reach a place, but also waste time you could have used at your intended destination. For security teams, knowing how to screen for false positives saves time and makes the team more efficient at addressing real threats. Learn
Publish At:2020-09-04 08:13 | Read:619 | Comments:0 | Tags:Threat Hunting Threat Intelligence Threat Research False Pos

6 Ransomware Trends You Should Watch for in 2020

A ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses more than $75 billion a year. Part of that financial impact results from downtime costs. Govtech also revealed that businesses lost an average of $8,500 per hour as the result of
Publish At:2020-08-04 07:43 | Read:707 | Comments:0 | Tags:Network Threat Research Advanced Malware Cryptoware Enterpri

DDoS Attacks Increase in Size, Frequency and Duration

Distributed denial of service (DDoS) attacks are increasing in size, frequency and duration. Kaspersky Lab reported a doubling of DDoS attacks in the first quarter of 2020 compared with the fourth quarter of 2019, plus an 80% jump compared with the same quarter last year. Kaspersky also found that DDoS cyberattacks are increasing in duration. Average attack
Publish At:2020-07-30 19:37 | Read:924 | Comments:0 | Tags:Advanced Threats Application Security Cloud Security Data Pr

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts security incidents can have on organizations, with histo
Publish At:2020-07-29 08:52 | Read:731 | Comments:0 | Tags:Data Protection Threat Intelligence Threat Research Cost of

Aviation Can Anticipate an Increase in State-Sponsored Activity

The combination of lockdown measures, travel restrictions and stalling demand brought on by COVID-19 has caused an unprecedented collapse in the global air transport industry. Facing a projected loss of $84.3 billion in revenue and 32 million aviation-related jobs worldwide, nations are scrambling to provide much-needed financial support to sustain domestic
Publish At:2020-07-28 17:26 | Read:699 | Comments:0 | Tags:Advanced Threats Threat Research X-Force IRIS Incident Respo

New Research Exposes Iranian Threat Group Operations

IBM X-Force Incident Response Intelligence Services (IRIS) has uncovered rare details on the operations of the suspected Iranian threat group ITG18, which overlaps with Charming Kitten and Phosphorous. In the past few weeks, ITG18 has been associated with targeting of  pharmaceutical companies and the U.S. presidential campaigns. Now, due to operational erro
Publish At:2020-07-16 08:09 | Read:598 | Comments:0 | Tags:Advanced Threats Incident Response Threat Intelligence Threa

Deciphering Between Incident Management and Crisis Management

Cyber threats come in many forms and can severely impact business operations, brand reputation, financial standing and even lead to a lawsuit. Organizations must prepare to respond and manage cyber events at different organizational levels to limit their damage and accelerate recovery. Most businesses focus on incident management or crisis management to reac
Publish At:2020-07-16 08:09 | Read:625 | Comments:0 | Tags:Incident Response Threat Intelligence Threat Research X-Forc

COVID-19 Cybercrime Capitalizing on Brazil’s Government Assistance Program

IBM X-Force Incident Response and Intelligence Services (IRIS) has been tracking cybercrime capitalizing on the coronavirus pandemic since January, and has observed the geographical areas of this activity shift over time. In February, cybercriminals were focusing on Asia, and we observed threat actors targeting potential victims in Japan with coronavirus-rel
Publish At:2020-07-07 11:48 | Read:683 | Comments:0 | Tags:Advanced Threats Threat Intelligence Threat Research X-Force

Vulnerable Powerline Extenders Underline Lax IoT Security

Multiple vulnerabilities have been found in Tenda PA6 Wi-Fi Powerline extender, version 1.0.1.21. This device is part of Tenda’s PH5 Powerline Extender Kit and extends the wireless network through home’s existing electrical circuitry. The kit, in collaboration with X-Force Red, IBM Security’s team of hackers, aligns with the HomePlug AV2 technology and
Publish At:2020-06-25 14:07 | Read:789 | Comments:0 | Tags:Application Security Endpoint Software & App Vulnerabilities

German Task Force for COVID-19 Medical Equipment Targeted in Ongoing Phishing Campaign

During the course of ongoing research on coronavirus-related cyber activity, IBM X-Force Incident Response and Intelligence Services (IRIS) uncovered a COVID-19 related phishing campaign targeting a German multinational corporation (MNC), associated with a German government-private sector task force to procure personal protective equipment (Task Force Schutz
Publish At:2020-06-08 06:45 | Read:858 | Comments:0 | Tags:Incident Response Threat Intelligence Threat Research Phishi

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly become a critical tool for businesses. In fact, tools for remote work have spiked 84 percent since February, with video conferencing platforms like Webex recently sharing that they
Publish At:2020-06-01 07:09 | Read:1068 | Comments:0 | Tags:Threat Research remote workforce Access Management Authentic

Tools

Tag Cloud