HackDig : Dig high-quality web security articles for hackers

How CVSS works: characterizing and scoring vulnerabilities

The Common Vulnerability Scoring System (CVSS) provides software developers, testers, and security and IT professionals with a standardized process for assessing vulnerabilities. You can use the CVSS to assess the threat level of each vulnerability, and then prioritize mitigation accordingly. This article explains how the CVSS works, including a review o
Publish At:2020-05-18 13:42 | Read:136 | Comments:0 | Tags:Malwarebytes news attack complexity attack vector bug bounty

What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring

We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS controls as they provide a critical baseline for maintaining our security framework and keeping
Publish At:2020-04-09 02:33 | Read:506 | Comments:0 | Tags:File Integrity Monitoring attack vector cyber attack File In

Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

New technologies often present interesting challenges for security teams, with cloud services such as AWS, Azure and GCP providing particularly novel cases in comparison to “classic” on-premise systems. As cloud services race to add new features that drive new customer interest and increase retention of existing clients, there is a very real risk of exposing
Publish At:2020-04-09 02:33 | Read:590 | Comments:0 | Tags:Cloud attack vector auditing system administrators

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How m
Publish At:2017-10-21 16:25 | Read:4277 | Comments:0 | Tags:Threats access points application attack vector endpoint End

Taking a Look at the Real British Social Engineers

I have a love/hate affair with the term ‘Social Engineer.’ To me, this is the most professional and committed ‘job’ I have ever had. It has required training and endless education, and it has changed my life in nearly every aspect.But for some, the term is used for when a free warranty deal is obtained or a loved one is tricked into exposing a secret.Take a
Publish At:2015-06-16 15:25 | Read:3803 | Comments:0 | Tags:Cyber Security Featured Articles attack vector Britan Dirty

Cisco 2015 Annual Security Report: Java on the Decline as Attack Vector

As recently as 2013, vulnerabilities involving Java appeared to be a favored tool of adversaries: Java was easy to exploit and, and exploits involving the programming language were difficult to detect. However, as reported in the Cisco 2015 Annual Security Report, Java is losing its front-runner position as a favored tool of bad actors looking to breach netw
Publish At:2015-02-03 19:35 | Read:3926 | Comments:0 | Tags:Security 2015 annual security report attack vector java JRE


Share high-quality web security related articles with you:)


Tag Cloud