HackDig : Dig high-quality web security articles for hackers

Do you know the Impact of COVID-19 on the Security Threat Landscape?

Q3 2020 Internet Security Report sheds light on COVID-19 threat trends, growing network attacks, malware targeting U.S. SCADA systems, and more. Panda, a WatchGuard brand, announced the release of its Internet Security Report for Q3 2020. Top findings from the research reveal how COVID-19 has impacted the security threat landscape, with evidence that attacke
Publish At:2020-12-16 08:10 | Read:413 | Comments:0 | Tags:Business News Panda Security advanced cybersecurity b2b quar

Why is encryption essential for modern day communications?

As we all are patiently waiting for 2020 to be over, it is easy to say that humanity has become significantly more dependent on technology, especially online communications. Nowadays, most of the communications that we do on personal and business levels are conducted online using smartphones, tablets, and computers. Many messages and video conferencing provi
Publish At:2020-12-14 13:40 | Read:295 | Comments:0 | Tags:Mobile News Security advanced cybersecurity corporate encryp

16 hardware and software platforms hacked in minutes. A contest or business reality?

To date in 2020, the Spanish Data Protection Agency (AEPD) has reported 837 security breaches affecting personal data, which is 201 more than those reported in the same period last year. Yet one in three of these are still without a security incident response plan, which underlines how the security teams charged with this task and with providing a forensic r
Publish At:2020-11-17 10:22 | Read:379 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b cyberat

The cold cyberwar and geopolitics: which weapons can protect endpoints?

Following World War II, the technological and arms race that began between the United States and the Soviet Union became known as the Cold War. The Cold War nowadays has entered into a new phase: cyberwarfare. Technology is increasingly being used to gain a competitive edge in global geopolitics, and governments are increasingly concerned about the strength
Publish At:2020-11-05 09:45 | Read:471 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b covid-1

Artificial Intelligence, disruptive innovation in cybersecurity

In the current reality in which the sheer number, professionalization, and sophistication of adversaries has forced organizations to bolster security policies and develop specific processes to prevent, detect, investigate, contain, and eradicate technologically advanced cyberattacks, Artificial Intelligence has burst onto the cybersecurity scene. AI has, in
Publish At:2020-10-22 06:27 | Read:370 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

What happens when your identity is stolen?

You’ve probably heard many times before that malware can be used to commit identity theft. You may also already know that identity theft is about criminals collecting enough personal information to fool people and computer systems into thinking they are someone else? But why would you want to pretend to be another person? Because there’s a lot of money to be
Publish At:2020-10-16 09:40 | Read:605 | Comments:0 | Tags:Mobile News privacy Security advanced cybersecurity banking

Five keys for mitigating cybersecurity breaches

A rapid and efficient response to incidents is a key part of any good cybersecurity strategy. As cyberattacks evolve at pace, IT departments start to question traditional methods of dealing with new criminal gangs and threats, and understand that there is no single or simple way to counter them, given the complexity of the digital environment. Today, an effe
Publish At:2020-10-14 11:15 | Read:468 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

The four areas that all cybersecurity policies should keep in mind

Just a few hours ago, we have seen how the low-cost airline Vueling, part of the IAG (Iberia) group, and the courier service Nacex, along with at least seven other smaller firms, have fallen victim to a vulnerability that exposed the data of thousands of employees who used the online learning services of the firms. And it is not the first time that such atta
Publish At:2020-10-06 08:39 | Read:394 | Comments:0 | Tags:Business News Tips advanced cybersecurity b2b vulnerabilitie

Carlos Arnal: “The economic impact of a DNS attack is too great to ignore the vulnerabilities that would enable it”

One of the main problems with DNS attacks is the increasing cost of the damage they cause, as well as their rapid evolution and the diverse range of attack types. Data exfiltration over DNS is a major concern in corporate environments. In order to protect themselves, organizations are prioritizing the security of network endpoints and improving DNS traffic m
Publish At:2020-09-30 12:13 | Read:459 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b dns int

How to take your company into the cloud and telecommute securely

A growing number of organizations are opting to migrate their data and applications to the cloud given the numerous benefits that this delivers: cost savings on server maintenance, scalability, and easy access to data from anywhere, to name just three. The latter is particularly important today due to the massive increase in telecommuting in response to the
Publish At:2020-09-15 08:10 | Read:1084 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cl

CactusPete APT group takes aim at military and financial targets

Nowadays, all types of businesses across all sectors are affected by cybercrime. This year, as the attack surface has grown due to the increase in telecommuting as a response to COVID-19, so other cyberthreats arising from generalized global uncertainty have also increased. Cybercriminals have not hesitated to take advantage of the situation in order to roll
Publish At:2020-09-01 16:11 | Read:434 | Comments:0 | Tags:Business Malware advanced cybersecurity apt b2b

Twitter insiders? Don’t get accused of spying because of your staff

Just ten days after one of the biggest hacks in the history of Twitter, while both internal and external investigators continue to try figuring out exactly what happened, the social network is once again the subject of brand-tarnishing headlines, this time centered on the company’s poor internal security highlighted by the recent case of Twitter sub-contract
Publish At:2020-08-06 08:23 | Read:906 | Comments:0 | Tags:Adaptive Defense Business News advanced cybersecurity b2b cy

Difference Between Antivirus and Antimalware + Do I Need Both?

Long before AI, back when you could choose the color of your Mac to match your room, computer viruses were simple. Threat detection was as easy as finding a “creeper system” within a line of code. Today, the original profile of a virus is nearly obsolete while more dangerous forms of malware have taken center stage. While a virus is indeed a type of malware,
Publish At:2020-08-05 13:05 | Read:830 | Comments:0 | Tags:Malware advanced cybersecurity Antivirus cybersecurity Virus

Garmin: the latest wearable attacked by ransomware and a controversial ransom

Garmin, the developer of smartwatches and GPS devices, along with its popular app for monitoring physical exercise and sharing results with other services and devices, has become one of the latest victims of ransomware. On July 27, the company announced the recovery of normal activity after the attack from the WastedLocker ransomware, which first appeared ea
Publish At:2020-08-04 10:03 | Read:703 | Comments:0 | Tags:Adaptive Defense Business Malware News Advac advanced cybers

Don’t let ransomware shut your business down!

If there is one characteristic that defines cybercrime today, it is the capacity to evolve and adapt to new environments and the ability to find ways of evading the cybersecurity measures taken by victims. Ransomware is no exception. One of the main features of ransomware as a threat, in addition to kidnapping data, is that it is constantly reinventing itsel
Publish At:2020-07-30 16:00 | Read:588 | Comments:0 | Tags:Adaptive Defense Malware News advanced cybersecurity b2b Ran


Tag Cloud