HackDig : Dig high-quality web security articles for hacker

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:3366 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a moment to be absolutely transparent about
Publish At:2017-05-20 10:20 | Read:4203 | Comments:0 | Tags:Company News breach crypto-malware detection enterprise Isol

WannaCry Ransomware Racing Around the World, Wreaking Havoc

This is a special rapid response blog to breaking news about the WannaCry ransomware attack that is now being seen in more than 100 countries. We’ll be updating our blog with additional news as we learn more.  “No x-rays/bloods/bleeps/phones/notes. This is unprecedented. It will be a miracle if no-one comes to harm.” This dramatic tweet from an Nationa
Publish At:2017-05-13 12:35 | Read:3290 | Comments:0 | Tags:Breaking News Threats breach breaking news endpoint microsof

Saks Fifth Avenue Left Customers’ Personal Information Exposed

Luxury retailer Saks Fifth Avenue has inadvertently exposed the personal details of tens of thousands of customers online.According to a report by media company BuzzFeed, customers’ details were, “up until recently, publicly available in plain text.”The incident affected online shoppers who had provided their email addresses and/or phone numbers to joi
Publish At:2017-03-21 08:55 | Read:4555 | Comments:0 | Tags:Latest Security News breach Saks Fifth Avenue

Your Cybercriminal Has an Image Problem

The recent official opening of the U.K.’s National Cyber Security Centre, which is a part of Government Communications Headquarters (GHCQ) and now the region’s main authority on cybersecurity, posed a question about how we perceive those responsible for cyberattacks, whether they are hackers, cybercriminals or script kiddies, to name but a few la
Publish At:2017-03-17 13:20 | Read:3072 | Comments:0 | Tags:Identity & Access Breach Data Breach Hackers Hacking Identit

Yahoo! Bleeds for the Protection of Customer Data

On March 1, Marissa Mayer, Yahoo!’s Chief Executive Office, gave up millions of dollars. As she noted in a blog post on Tumblr, “I am the CEO of the company [Yahoo!] and since this incident happened during my tenure, I have agreed to forgo my annual bonus and my annual equity grant.” All in, Mayer gave up upwards of 2 million in cash bonuses and millions mor
Publish At:2017-03-17 12:35 | Read:3339 | Comments:0 | Tags:Cyber Security Featured Articles breach data Yahoo

2.2 Million Email Addresses Exposed in Wishbone Data Breach

A popular social media app known as Wishbone has suffered a data breach that exposed 2.2 million email addresses along with 287,000 cell numbers.In the middle of March 2017, security researcher Troy Hunt received a MongoDB database that belongs to Wishbone. The app, first founded in 2015, allows users to vote on two-choice polls. Over the past two years, it&
Publish At:2017-03-16 18:05 | Read:3686 | Comments:0 | Tags:Latest Security News breach password social networking

FIM: A Proactive and Reactive Defense against Security Breaches

No matter how well-designed it is, a security program will never prevent every digital attack. But an assault need not escalate into a data breach. Organizations can reduce the likelihood of a major incident by investing in key security controls.One such fundamental security component is FIM. Short for “file integrity monitoring“, FIM helps organ
Publish At:2017-03-10 11:25 | Read:3414 | Comments:0 | Tags:Featured Articles Incident Detection breach Change FIM

Payment Solutions Firm Verifone Investigates Security Breach

Payment solutions provider Verifone is reportedly investigating a breach of its internal computer networks dating back to mid-2016 that may have affected a number of businesses running its point-of-sale (POS) terminals.According to a report by investigative journalist Brian Krebs, the payments giant said the extent of the breach is limited to its corporate n
Publish At:2017-03-08 22:35 | Read:3565 | Comments:0 | Tags:Latest Security News breach payment point-of-sale Verifone

Deception as a {Free} Post-Breach Detection Tool

The Clifford Stoll’s interesting story of stalking the wily hacker back in the 80s was probably the first time deception was used for catching a hacker. Since then, the technology has changed a lot, but the concept of honeypots and deception in general has remained the same.Despite the undeniable and important role that honeypots have in proactive defense st
Publish At:2017-03-08 04:10 | Read:3946 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breach det

Boeing Notifies 36,000 Employees of Email-Based Security Breach

Boeing has notified 36,000 employees of a security breach involving an email that inadvertently disclosed their personal information.On 8 February 2017, the American aerospace company sent a letter to Bob Ferguson, Attorney General for Washington State. In it, Boeing says a security incident might have exposed the personal information of 7,288 residents of t
Publish At:2017-02-28 23:20 | Read:3496 | Comments:0 | Tags:Latest Security News breach personal information security

The Cost of Stolen Information Available on the Dark Web

Large hacks and cyber-attacks aimed at exploiting information, affecting everyone from major company databases to politician’s email accounts, have now become a common occurrence in our ever-connected world. This hacked information – and the act of accessing it – has rapidly become a sought-after product and service on dark web marketplaces. Coupled with the
Publish At:2017-02-22 01:15 | Read:6000 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breach Dar

Rasputin Hacker Uses SQLi to Hack 60 Universities and Government Agencies

A hacker known as Rasputin used SQL injection (SQLi) to breach the databases of over 60 universities and government agencies.The threat actor, a Russian-speaking computer criminal who gained notoriety back in December 2016 for hacking the U.S. Election Assistance Commission (EAC), is targeting universities and government facilities based in the United States
Publish At:2017-02-16 16:15 | Read:4050 | Comments:0 | Tags:Latest Security News breach Hacker security

InterContinental Hotels Group Confirms Payment Card Breach at 12 Locations

InterContinental Hotels Group (IHG) has confirmed a data breach affected customers’ payment cards at 12 of its locations.On 3 February, IHG announced that it launched an investigation back on 28 December 2016 after receiving a report of unauthorized charges placed on customers’ credit cards. The Denham-based company, which owns 5,000 hotels that
Publish At:2017-02-07 10:45 | Read:3654 | Comments:0 | Tags:Latest Security News breach data malware

Inception and the Road from Security Serendipity

You spin the top and wait to see if it continues in kinetic motion or if it falls to the pull of gravitational force. You trust that the road chosen to walk the path of serendipity toward an anticipated culmination of the correct state of scientific innovation – which, in this case, has been forged to deliver a true state of cyber security is correct. The qu
Publish At:2017-01-31 12:55 | Read:3507 | Comments:0 | Tags:Featured Articles breach security


Share high-quality web security related articles with you:)


Tag Cloud