HackDig : Dig high-quality web security articles for hacker

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:178 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Our Bring Your Own Malware Challenge is Back!

We are hosting the Bring Your Own Malware Challenge at a series of upcoming events. Bring it to InfoSec in London, Gartner Security Summit in Maryland and of course, Black Hat in July. The rules are simple, you have to plan ahead, but we have a cash prize. That’s right. We’ll be hosting our BYOM aka Bring Your Own Malware Challenge once again, and it will
Publish At:2017-05-25 01:00 | Read:263 | Comments:0 | Tags:Company News Threats challenge endpoint infosec Isolation Ma

Fresh Phish. (So Many Puns, So Little Time.)

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig
Publish At:2017-05-23 12:10 | Read:216 | Comments:0 | Tags:Threats apps attachments browsing files humans Isolation Mal

Why Virtualization Rocks; Stopping Nation-State, Polymorphic Malware (video)

The WannaCry ransomware attack was a call to arms. We actually were lucky; it could have been a lot worse. Employees need to open attachments; you need to stop worrying about that. In the shadow of WannaCry, we hosted a live webcast with our co-founder, Ian Pratt and team members, Robert Wiggenhorn and Simon Plant, to answer questions about the ransomware
Publish At:2017-05-16 14:15 | Read:319 | Comments:0 | Tags:Threats

Security Professionals Admit to Paying Ransom and Hiding Breaches (Infographic)

We did a survey at RSAC in February that kind of blew our minds; so much so we surveyed more people to check our work! Security professionals admit to paying ransom (from ransomware) and not telling anyone what they’d done. When we went more broadly – U.S. and U.K. security pros – the numbers didn’t get better (they got worse). Have
Publish At:2017-05-13 12:35 | Read:270 | Comments:0 | Tags:Company News Threats breaches infographic Malware ransom Ran

WannaCry Ransomware Racing Around the World, Wreaking Havoc

This is a special rapid response blog to breaking news about the WannaCry ransomware attack that is now being seen in more than 100 countries. We’ll be updating our blog with additional news as we learn more.  “No x-rays/bloods/bleeps/phones/notes. This is unprecedented. It will be a miracle if no-one comes to harm.” This dramatic tweet from an Nationa
Publish At:2017-05-13 12:35 | Read:292 | Comments:0 | Tags:Breaking News Threats breach breaking news endpoint microsof

The Economist on the Cyber Security Industry

A recent copy of the Economist caught my eye with the front page headline of “Why computers will never be safe”. For a non-technical publication they have managed to give some great insight into the reasons why the security industry has a problem. The article calls out how profitable it is for hackers to exploit a vulnerability, and how high tech companies
Publish At:2017-05-01 08:20 | Read:317 | Comments:0 | Tags:Breaking News application isolation applications Economist H

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
Publish At:2017-04-25 18:10 | Read:317 | Comments:0 | Tags:Government Threats Battlefield CIA criminals Federal governm

Zero-Day Exploits – Your Days are Numbered! [infographic]

News stories involving zero-day Windows kernel exploits seemingly never end. Fresh examples abound with alarming regularity and devastating effects, often involving defects with a dwell time of many months before they are formally addressed by patch updates. Despite a sustained focus by Microsoft on improving cybersecurity top to bottom, dubious new records
Publish At:2017-04-21 22:10 | Read:506 | Comments:0 | Tags:Threats backlog exfiltrate kernel microsoft NSA operating sy

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics
Publish At:2017-04-18 02:05 | Read:440 | Comments:0 | Tags:Breaking News Threats anti-virus command control EDR Events

Zero-Day Vulnerability is a Zero-Sum Game

Late last week a new Microsoft Office vulnerability was discovered by McAfee; they discovered attacks exploiting this vulnerability back to late January 2017. This should raise substantial concern for anyone responsible for cyber security at their company or federal agency. Since January, every Windows-based MS Office machine was exposed to the worst type o
Publish At:2017-04-16 13:05 | Read:347 | Comments:0 | Tags:Breaking News Government Threats Malware McAfee Microsoft Of

Malware is Becoming Alarming. Can You Hear Me Now?

A supposed “white hat” hacker gained access to the network of the Dallas Office of Emergency Management and managed to set off 156 sirens used to alert of an emergency Alarms blared for 90 minutes before the city was able to manually shut down the entire system. How does this continue to happen? Because the current method of stopping malware just isn’t work
Publish At:2017-04-16 13:05 | Read:460 | Comments:0 | Tags:Breaking News Government Threats Alarms application isolatio

Breaking News: “It’s a Very Large-Scale Espionage Operation”

A complex cybercrime spy ring has been revealed today. A China-based cyber gang is behind the effort. Countries targeted include Japan, UK, France and the United States. If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story
Publish At:2017-04-05 08:55 | Read:1875 | Comments:0 | Tags:Breaking News Threats browsing China click crime email Malwa

Did You Have Ransomware Served to You Via Skype?

News breaking today that Skype users are being targeted by ransomware. Cybercriminals use Adobe Flash to get the job done. Bromium protects you from this kind of nonsense. It’s so hard to know when something can be trusted. And those of us who are just trying to get our jobs done using regular business tools are most often the target. I know: I am an
Publish At:2017-04-03 20:00 | Read:449 | Comments:0 | Tags:Breaking News Beta browsing click confidence end user Malwar

Busting the Non-Persistent VDI Security Myth!

VDI, including non-persistent VDI, does little or nothing to stop today’s malware. VDI is just as susceptible to malware as physical desktops. Virtualization-based Security (VBS) helps solve the cyber security challenges for both physical and virtual desktops. Running Bromium’s Federal Professional Services team, I get the opportunity to meet with some o
Publish At:2017-03-14 02:00 | Read:409 | Comments:0 | Tags:Threats Security VDI Virtualization Virtualization Based Sec

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud