HackDig : Dig high-quality web security articles for hacker

Securing the managed service provider (MSP)

Managed service providers (MSPs) have been a boon to midsize enterprise. They allow for offloading technical debt to an agent with the skills and resources to manage it, thereby giving an organization room to focus on growing a business, rather than the particulars of infrastructure. For a long while, third-party service providers were not targeted dire
Publish At:2019-10-11 23:25 | Read:117 | Comments:0 | Tags:Business advanced persistent threats APT APT attacks APTs en

Magecart is back: hotels in the firing line

Back in July, a group of cyberattackers called Magecart made the e-commerce word shake. Its malicious skimming code, which is inserted into the websites of these businesses to steal personal and financial data from their customers when making purchases, was discovered on nearly 18,000 domains. And this incident wasn’t the only one. A year ago, British Airway
Publish At:2019-10-11 10:35 | Read:58 | Comments:0 | Tags:News Security business hotel chains supply chain

Panda Security and Infinigate France sign a distribution agreement.

This partnership is perfectly in line with Panda Security’s strategy of developing its network of partners in order to accelerate its growth on the B2B market in France. Panda Security France officially announces a new distribution agreement with Infinigate France, one of the main European VADs operating in the cybersecurity sector. This decision fol
Publish At:2019-10-10 10:35 | Read:157 | Comments:0 | Tags:News Panda Security business edr france

Are Cybersecurity Robots Coming For Your Job?

“14 Jobs That Will Soon Be Obsolete.” “Can A Robot Do Your Job?” “These Seven Careers Will Fall Victim to Automation.” For each incremental advance in automation technology, it seems there’s an accompanying piece of alarmist clickbait, warning of a future in which robots will be able to do everything we can, only better, cheaper, and for longer. Proponents o
Publish At:2019-10-09 23:20 | Read:91 | Comments:0 | Tags:Business

OpenDreamBox: the vulnerability that affects 32% of the world’s companies

The Internet of things (IoT) has revolutionized the business world. It has helped to streamline industrial processes, reduce costs, and has even created new business models. But, as is often the case, all of these advantages go hand in hand with a series of disadvantages. The most important of these disadvantages is the significant increase in the attack sur
Publish At:2019-10-09 10:35 | Read:185 | Comments:0 | Tags:News Security business IoT vulnerabilities Vulnerability

Ransomware hits several Spanish city halls

Ransomware is back. Well, in fact, it never went away. However, what is true that from time to time we see more aggressive campaigns with a wider impact, or attacks that are more striking or more flashy. The list of institutions affected by this kind of malware this year keeps growing. In May, the city of Baltimore was attacked with a strand of ransomware ca
Publish At:2019-10-08 10:35 | Read:204 | Comments:0 | Tags:Malware News business governments Ransomware

Bidfreight Port Operations and logistics industry cybersecurity

The logistics industry is a vital part of the modern economy. The services provided by this sector ensure the availability of goods and products as essential as food and medicine. It could be seen as the backbone of the economy in many senses. The cybersecurity issues in the industry are, therefore, particularly worrying. A recent report reveals that only 35
Publish At:2019-10-07 10:35 | Read:112 | Comments:0 | Tags:Case Study advanced cybersecurity business

UK Government Warn Schools Over Cyberthreats

The subject of cybersecurity within the education sector is a key topic at the moment, particularly with the rise in reported ransomware incidences and data breaches. The National Cyber Security Centre (NCSC), tasked with providing cybersecurity advice and support to the UK public and private sectors, has released a report on The cyber threat to Universities
Publish At:2019-10-04 10:35 | Read:182 | Comments:0 | Tags:News business education UK

Fraud with a deepfake: the dark side of artificial intelligence

Over the last few years, fake news has been a major worry. Fake news is believed to have played an important role in such important electoral processes as the 2016 US presidential election and the Brexit referendum on the withdrawal of the United Kingdom from the European Union the same year. There is now another kind of fake that is causing concern: deep fa
Publish At:2019-10-02 10:35 | Read:188 | Comments:0 | Tags:News Security artificial intelligence business Scam

Operation reWired: 281 BEC scammers arrested worldwide

BEC scams (business email compromise) are big business for cybercriminals. According to the Financial Crimes Enforcement Network (FinCEN), these scams generate around $301 million every month, or $3.6 billion a year. The aim of a BEC scam is to trick an employee into carrying out a fraudulent bank transfer. To do this, cyberattackers send an email impersonat
Publish At:2019-09-27 10:35 | Read:199 | Comments:0 | Tags:News Security bec business scams

Internet Explorer and Microsoft Defender: vulnerable to RCE attacks

Last year, an average of 45 vulnerabilities were discovered every day. This is almost three times more than in 2016. . Cyberincidents as well-known as WannaCry, the Equifax data breach, and the cyberattack on the Winter Olympics are were all facilitated by a vulnerability. Last month, a vulnerability in the WebAdmin plugin of OpenDreamBox was discove
Publish At:2019-09-26 10:35 | Read:230 | Comments:0 | Tags:News Security business vulnerabilities Windows

The Seven Main Phishing Lures of Cybercriminals

One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to spot due to link misspellings, odd link redir
Publish At:2019-09-24 23:20 | Read:330 | Comments:0 | Tags:Business Consumer Mobile and IoT Security email phishing Phi

How Endpoint Detection and Response gave rise to Threat Hunting

In the past, a signature-based cybersecurity solution could be relied on to protect your organization against malware – with updates being posted to you on a floppy disk each month. Signature based solutions are very efficient and accurate at spotting known malware. Signature detection was sufficient until polymorphic techniques (compression and encryption)
Publish At:2019-09-24 10:35 | Read:324 | Comments:0 | Tags:Panda Security Security business edr threat hunting

What role does data destruction play in cybersecurity?

When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection, firewalls, network and endpoint security, employee awareness training, AI and machine-learning technology—you get the idea. What’s not often considered is which items should be taken away. Nearly
Publish At:2019-09-20 23:20 | Read:386 | Comments:0 | Tags:Business data data breach data destruction Data privacy dega

Cybersecurity Platforms: 8 Must-Have Attributes

Defending enterprises against the growing frequency and complexity of cyberattacks is becoming an ever-increasing burden to cybersecurity budgets and manpower. An ESG enterprise-class cybersecurity technology platform white paper commissioned by McAfee shows CISOs have “reached a tipping point where the current cybersecurity point tools are no longer accepta
Publish At:2019-09-20 23:20 | Read:383 | Comments:0 | Tags:Business


Share high-quality web security related articles with you:)


Tag Cloud