HackDig : Dig high-quality web security articles for hacker

NDAY-2017-0105: Elevation of Privilege Vulnerability in MSM Thermal Driver

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) Following our announcement on N-Days Exploit Acquisition Program for smartphones, we are delighted to share the first couple of submissions. We received many submissions and we’re in the process of sharing them with ZHA followed by a public disclosure
Publish At:2017-04-25 15:35 | Read:1109 | Comments:0 | Tags:Android Mobile Malware Mobile security Threat Research Uncat

NDAY-2017-0102: Elevation of Privilege Vulnerability in NVIDIA Video Driver

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Nicolas Trippar Follow Nicolas Trippar (@ntrippar) Following our announcement on N-Days Exploit Acquisition Program for smartphones, we are delighted to share the first couple of submissions. We received many submissions and we’re in the process of sharing them with ZHA followed by a public disclosur
Publish At:2017-04-25 15:35 | Read:1194 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

Threat Research: FalseGuide

This Threat Research is about the recently (re)discovered “FalseGuide” threat found in Google Play. FalseGuide is form of malware that has been hidden in more than 40 game guide apps in Google Play since February 2017. According to reports, approximately 600,000 devices may have been infected before the known versions of the malware were removed from Google
Publish At:2017-04-25 15:35 | Read:867 | Comments:0 | Tags:Android Mobile Malware Mobile security Mobile Threat Defense

Threat Research: Pre-Installed Android Malware

This Threat Research is about the recently discovered “Pre-installed Android Malware” threat. At least 36 high-end smartphone models belonging to popular manufacturing companies such as Samsung, LG, and Lenovo were found pre-loaded with 21 malware programs. The programs were part of two malware families: Loki and SLocker. The malicious apps were not part of
Publish At:2017-03-16 22:05 | Read:878 | Comments:0 | Tags:Android Threat Research

Threat Recap: Week of April 4th

A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. Credit Card Breach at Trump Hotels It has recently been reported that the Trump Hotel chains have been the target of yet another credit ca
Publish At:2016-04-09 01:05 | Read:1203 | Comments:0 | Tags:Threat Research Breach data breach data leak Hacked hacker I

Threat Recap: Week of March 28

  A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week.   MedStar Health, Latest Medical Services Ransomware Target Early this week, MedStar Health, one of the largest healthcare pro
Publish At:2016-04-02 05:10 | Read:1294 | Comments:0 | Tags:Threat Research

Threat Recap: Week of March 21st

A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. Microsoft Addresses Macro Malware Issue With macros being a major vulnerability point in Microsoft Office software, the 2016 version of th
Publish At:2016-03-25 15:30 | Read:1771 | Comments:0 | Tags:Threat Research Breach cybersecurity DDOS healthcare breach

Threat Recap: Week of March 14th

A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. Credit Card Fraud Now Quicker Than Ever There are thousands of cases of credit card fraud that occur every year, usually through a merchan
Publish At:2016-03-18 20:00 | Read:1342 | Comments:0 | Tags:Threat Research Bank breach Breach Credit Card Fraud DDOS ma

Malvertising: When Ads Go Rogue

  Advertisements on the internet are no longer just a nuisance. They are now also potentially dangerous. Even sticking to widely used and trusted websites can be risky, as the banner ads they contain may be carrying malicious code. “Malvertising”, a combination of “malware” and “advertising”, is the technique of using
Publish At:2016-03-15 01:10 | Read:1065 | Comments:0 | Tags:Threat Research cyberciminals Evasive Malvertising Exploits

Threat Recap Week of March 11th

  A lot happens in the security world, and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. Tax Season Leads to Rise in Phishing Attacks As we’ve seen in the past, corporations preparing their taxes for the April dea
Publish At:2016-03-12 00:40 | Read:1261 | Comments:0 | Tags:Threat Research

Microsoft Patch Tuesday – March 2016

Patch Tuesday for March 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 13 bulletins addressing 44 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Edge, Graphic Fonts, Internet Explorer, W
Publish At:2016-03-09 08:15 | Read:1101 | Comments:0 | Tags:Threat Research internet explorer Microsoft office patch tue

What you need to know about the new KeRanger Ransomware.

  Palo Alto Networks recently discovered ransomware hidden inside of the torrenting app ‘Transmission’. While this may come as a shock to those that still believe the Mac is a fortress that can’t be broken, the rest of us are not shocked at all. In fact, a few months back I wrote a blog warning Mac users not to dismiss Mac malware. It
Publish At:2016-03-08 06:15 | Read:1690 | Comments:0 | Tags:Threat Research encrypting ransomware Keranger mac mac malwa

Threat Recap Week of March 4th

  German Hospitals Latest Ransomware Target In the past week, several German hospitals have reported ransomware attacks on their internal systems. While one of the hospitals was able to minimize the damage by isolating the infected server, Lukas Hospital wasn’t as fortunate, as their system had been encrypted before they could react properly. Fort
Publish At:2016-03-05 05:55 | Read:1371 | Comments:0 | Tags:Threat Research cloud security hackers Malware phishing

Cyber Threat Actors

Cyber threats come from a wide array of sources, but can be grouped into three categories: Hacktivists These are tech-savvy individuals who are normally motivated by morality. These individuals are also classed by many (including the FBI) as terrorists. One of the main hactivist groups out there is anonymous. This group rose from one of the most popular imag
Publish At:2016-02-24 10:50 | Read:1654 | Comments:0 | Tags:Threat Research

Locky Ransomware

A new form of ransomware has hit the scene, and although this one has a playful nickname it is no fun at all. The bad news is that “Locky” ransomware will encrypt virtually every commonly used file-type and targets not only local drives, but any networked drives it can find, even if they are unmapped. The good news is that Locky is easily prevent
Publish At:2016-02-22 22:40 | Read:1399 | Comments:0 | Tags:Threat Research Locky Malware ransomware

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud