HackDig : Dig high-quality web security articles for hacker

A Modern Hypervisor as a Basis for a Sandbox

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, including an Android sandbox. In this article, we will look at just one of
Publish At:2017-09-19 11:40 | Read:66 | Comments:0 | Tags:Publications Antivirus Technologies Security technology Targ

Protecting Legacy Applications from Attacks with Modern Hardware Isolation

Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of cybersecurity d
Publish At:2017-09-11 10:00 | Read:197 | Comments:0 | Tags:Company News detection Isolation legacy legacy apps Micro-VM

VMworld 2017 – Our Virtualization-Based Security Resonated with Architects, CISOs and Security-Minded Professionals

We were so happy to be in our element with folks who understand the inherent value in virtualization. From booth demos to our theater presentation on the Showcase stage to the private breakfast with The Godfathers of Virtualization, we received amazing feedback. We look forward to bringing our solution to your business – is it time for a meeting? VMworld i
Publish At:2017-09-05 12:15 | Read:210 | Comments:0 | Tags:Company News architect productivity Security Virtualization

TechNet Augusta and DoDIIS Worldwide – Moving Government Cybersecurity Forward

We will be at TechNet Augusta on August 7-11. Visit us at booth 112. We will be at DoDIIS Worldwide Conference on August 13-16 in St. Louis. Visit us at booth 739. Discover how application isolation and containment is the long-term strategy for cyber resilience. If you’re responsible for government cybersecurity, we’ve got something you’l
Publish At:2017-08-03 12:45 | Read:244 | Comments:0 | Tags:Government application isolation augusta containment demo do

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:605 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where security specialists monitor, assess and defend against computer security issues. Introducing virtual reality (VR) and augmented reality (AR) technology into this environment can enhance the team’s performa
Publish At:2017-07-03 23:50 | Read:279 | Comments:0 | Tags:Security Intelligence & Analytics IBM QRadar SIEM Security I

Get all the Docker talks from Tech Field Day 12

As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group.  The final event was Tech Field Day 12 hosting in Silicon Valley. In case you
Publish At:2017-05-24 19:06 | Read:426 | Comments:0 | Tags:Docker Education Engine Events Networking Security docker fo

The Economist on the Cyber Security Industry

A recent copy of the Economist caught my eye with the front page headline of “Why computers will never be safe”. For a non-technical publication they have managed to give some great insight into the reasons why the security industry has a problem. The article calls out how profitable it is for hackers to exploit a vulnerability, and how high tech companies
Publish At:2017-05-01 08:20 | Read:462 | Comments:0 | Tags:Breaking News application isolation applications Economist H

Zero-Day Exploits – Your Days are Numbered! [infographic]

News stories involving zero-day Windows kernel exploits seemingly never end. Fresh examples abound with alarming regularity and devastating effects, often involving defects with a dwell time of many months before they are formally addressed by patch updates. Despite a sustained focus by Microsoft on improving cybersecurity top to bottom, dubious new records
Publish At:2017-04-21 22:10 | Read:744 | Comments:0 | Tags:Threats backlog exfiltrate kernel microsoft NSA operating sy

The HP EliteBook is Shipping – You Are Free to Safely Browse the Internet

As we announced in February, HP Sure Click begins shipping on the new HP EliteBook x360 starting today. This beauty not only has a secure BIOS but also offers secure browsing – security built-in, not bolted-on. With this launch, virtualization-based security goes completely mainstream, direct to the prosumer. We are so pleased to share the news that
Publish At:2017-04-18 20:30 | Read:587 | Comments:0 | Tags:Company News End Users browsing Chrome Edge EliteBook x360 H

Why Bromium Is Not Just Protection, But Also An Enhanced Predictive Analytics Solution

Zero-day attacks exploit vulnerabilities or security holes in software. In the event of a malicious attack on any microVM, malware payloads cannot infiltrate the enterprise network. LAVA provides highly specific details about every malicious breach, identifying external IP addresses, memory exploits, a list of affected files, and covert attempts to connect
Publish At:2017-04-16 13:05 | Read:336 | Comments:0 | Tags:Innovation Data Analytics Endpoint Protection Forensics Virt

Breaking News: “It’s a Very Large-Scale Espionage Operation”

A complex cybercrime spy ring has been revealed today. A China-based cyber gang is behind the effort. Countries targeted include Japan, UK, France and the United States. If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story
Publish At:2017-04-05 08:55 | Read:2377 | Comments:0 | Tags:Breaking News Threats browsing China click crime email Malwa

Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Augmented reality and virtual reality are no longer theoretical concepts, and both have advanced considerably in their design and use in a wide range of industries. While there are many articles, books, research papers, studies and conferences around these two technologies, only a few venues have explored their potential use as threat modeling tools that co
Publish At:2017-03-23 16:55 | Read:483 | Comments:0 | Tags:Risk Management Insider Threat Mobile Devices Mobile Securit

Busting the Non-Persistent VDI Security Myth!

VDI, including non-persistent VDI, does little or nothing to stop today’s malware. VDI is just as susceptible to malware as physical desktops. Virtualization-based Security (VBS) helps solve the cyber security challenges for both physical and virtual desktops. Running Bromium’s Federal Professional Services team, I get the opportunity to meet with some o
Publish At:2017-03-14 02:00 | Read:601 | Comments:0 | Tags:Threats Security VDI Virtualization Virtualization Based Sec

Xen Project patches serious virtual machine escape flaws

The Xen Project has fixed four vulnerabilities in its widely used virtualization software, two of which could allow malicious virtual machine administrators to take over host servers.Flaws that break the isolation layer between virtual machines are the most serious kind for a hypervisor like Xen, which allows users to run multiple VMs on the same underly
Publish At:2016-09-09 16:00 | Read:733 | Comments:0 | Tags:Security Virtualization

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud