HackDig : Dig high-quality web security articles for hacker

Panda Security promotes “Global security in the age of hybrid conflicts”

The 35th International Workshop on Global Security was presented in Paris on April 16 and 17 last year, with the theme of “Global Security in the Age of Hybrid Warfare and the Cyber Threat.” The alignment between the Workshop and Panda Security’s quality standards allowed us to take part in this event as a technology partner. The subjects covered
Publish At:2020-01-22 09:15 | Read:56 | Comments:0 | Tags:Business Panda Security advanced cybersecurity cyberwar

Help?! Possible global hacker attack by Citrix vulnerability

Following another official vulnerability alert issued in the past 48 hours, which has been known since December, companies still protected from this new attack are continuously receiving new requests for help. CISA considers the vulnerability to be one of the most dangerous exploits of recent years. Potentially, some 80,000 companies worldwide are at risk. T
Publish At:2020-01-17 09:15 | Read:308 | Comments:0 | Tags:News Security business Exploit Germany vulnerability Vulnera

The new critical vulnerability in Windows 10 has a solution: UPDATE NOW

Yesterday, January 14, Microsoft launched a patch for a critical security vulnerability in Windows 10, and Windows Server 2016 and 2019, among others. The vulnerability, categorized as CVE-2020-0601, which was discovered by the NSA, affects a component known as CryptoAPI (Crypt32.dll). Among the features of the CryptoAPI component is its use in digital signa
Publish At:2020-01-15 16:15 | Read:221 | Comments:0 | Tags:Business News patch management vulnerabilities windows 10 Vu

The CCPA: the new data protection law for California

In May 2020, the GDPR turns two. This European data protection regulation has been obligatory since 2018, and allows fines of up to 4% of a company’s annual global turnover. Since it was implemented, this regulation has been used to hand million-euro fines to such large companies as British Airways and Marriott International. In the last few months, we have
Publish At:2020-01-14 10:35 | Read:158 | Comments:0 | Tags:Business News data breach data protection

Panda Security: 100% corporate endpoint protection according to AV-Comparatives

Panda Security regularly participates in tests to evaluate the protection levels and performance of our security solutions. The latest test in which we have participated is AV-Comparatives’ Business Security Test for August to November. The independent laboratory has discovered that Panda Security’s solution has achieved maximum levels of protection. Betwee
Publish At:2019-12-23 10:35 | Read:248 | Comments:0 | Tags:Business News AV Comparatives endpoint protection test

The GDPR in 2019: the year of the million euro fine

The GDPR came into force in May 2018. This European regulation revolutionized personal data protection, and helped increase awareness of this important subject. The regulation sets out hefty fines of up to 4% of a company’s global annual turnover, or up to €20 million, for organizations that infringe the rules. Although we started to see  a few sanctions und
Publish At:2019-12-18 10:35 | Read:366 | Comments:0 | Tags:Business Security data breach data control gdpr

5 tips for building an effective security operations center (SOC)

Security is more than just tools and processes. It is also the people that develop and operate security systems. Creating systems in which security professionals can work efficiently and effectively with current technologies is key to keeping your data and networks secure. Many enterprise organizations understand this need and are attempting to meet it with
Publish At:2019-12-13 16:50 | Read:284 | Comments:0 | Tags:Business Endpoint Protection incident responder incident res

2019: The ransomware tsunami

This has been another record-breaking year for ransomware attacks. The waves of attacks seen in the USA at the start of the year, followed by attacks on public administrations all over Europe, and the latest breaches detected in Spain have all led to ransomware keeping its place on the list of the most important cyberthreats in 2019. And the statistics speak
Publish At:2019-12-12 04:15 | Read:330 | Comments:0 | Tags:Business Security advanced cybersecurity business Ransomware

Over 1 billion people’s data leaked in an unsecured server

Data enrichment companies are big business these days. They merge the data stored by other companies with third-party data in order for these companies to be able to take more informed decisions. Enriched data provides deeper insights into the companies’ customers, which allows them to adjust their business model so that it better adapts to their current or
Publish At:2019-12-05 10:35 | Read:278 | Comments:0 | Tags:Business News advanced cybersecurity data breach

TMS Industrial Services and industrial cybersecurity

These days, there’s no arguing the fact that all sectors are, to a greater or lesser degree, exposed to some kind of cyber-risks.  This is especially true in a world in which more and more organizations are using networks that are connected to external partners and providers, and are starting to adopt IoT systems, increasing the attack surface. One of the se
Publish At:2019-12-02 10:35 | Read:415 | Comments:0 | Tags:Business Case Study Africa business industrial sector

PureLocker: the unusual ransomware that encrypts servers

In 2019, the resurgence of ransomware is still in full swing. Since the beginning of the year, a veritable litany of companies and organizations have suffered at the hands of this kind of malware: local governments, manufacturers, hospitals, producers, critical infrastructure… While we know who the victims of these ransomware attacks are, more often th
Publish At:2019-11-30 09:15 | Read:462 | Comments:0 | Tags:Business Security advanced cybersecurity Ransomware

The state of cybersecurity in 2019: What do the experts think?

This Saturday, November 30, is Computer Security Day. The aim of this annual event is to increase knowledge and awareness of the risks that users’ computers, devices and systems are exposed to all over the world. Download the eBook here Since this initiative was launched by the Association for Computing Machinery (ACM) in 1988, the technological landscape h
Publish At:2019-11-26 16:15 | Read:328 | Comments:0 | Tags:Business Panda Security advanced cybersecurity Computer Secu

José Manuel Díaz-Caneja: “At times it is easier to corrupt an employee than to use cyberattacks to bring down a system”

When it comes to protecting organization’s corporate cybersecurity, there are several fronts. Two of them, however, are particularly important: first, monitoring the human factor, which is often the main trigger for cyberattacks or data leaks. The second is applying intelligence to all processes so that advanced cyberdefense isn’t reactive, but instead is ba
Publish At:2019-11-21 10:35 | Read:356 | Comments:0 | Tags:Business Panda Security advanced cybersecurity guest article

Georgia suffers the largest cyberattack in its history

These days, every organization is a potential victim of a cyberattack. This year we’ve seen a wide range of organizations fall into the trap of cybercrime, from oil companies and banks, to public administrations such as city halls or critical infrastructure. All of them are susceptible to becoming targets of serious cyberincidents. These IT security intrusio
Publish At:2019-11-19 10:35 | Read:256 | Comments:0 | Tags:Business News advanced cybersecurity business cyberwar

SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath

Cyberattacks, many have noted, are the fastest growing economic crime not only in the United States, but also around the world. This upward trend has been observed since 2014, according to PricewaterhouseCoopers (PwC), and won’t likely be slowing down anytime soon. Cyberattacks—much like the advancement of technology, the interweaving of digital lives am
Publish At:2019-11-11 23:20 | Read:357 | Comments:0 | Tags:Business cyberattacks malware medium businesses Pricewaterho


Share high-quality web security related articles with you:)


Tag Cloud