HackDig : Dig high-quality web security articles for hacker

Inrego: Cybersecurity and e-waste recycling

According to the World Economic Forum’s Global Risks Report 2020, climate action failure is the top global risk in terms of impact. One action that can be taken to reduce this risk is to recycle; this goes for everything from domestic waste such as plastic containers, to more complex objects like technology. In fact, the amount of technology that is th
Publish At:2020-04-04 16:10 | Read:95 | Comments:0 | Tags:Business Case Study b2b case study recycling

How to protect hospitals against the ransomware Netwalker

Hospitals are one of the most important critical infrastructures at the best of times, and more so right now, with the global health emergency caused by COVID-19. At this time, it is imperative that hospitals function as well as they possibly can, with no setbacks. However, we must not lose sight of the fact that the entire sector is currently in the midst o
Publish At:2020-04-01 10:45 | Read:138 | Comments:0 | Tags:Business News b2b healthcare sector Ransomware

A cyberattack paralyzes coronavirus testing center

Right now, many countries are in a state of alarm, and people and organizations around the world are coming together to face the current coronavirus COVID-19 pandemic. Companies are also making efforts to streamline the adoption of new methodologies such as telecommuting in order to protect their employees’ health. However, it also also the case that t
Publish At:2020-03-27 11:51 | Read:274 | Comments:0 | Tags:Business News b2b coronavirus cyberattack hospital Virus

5 Tips for Working at Home – Comfortably and Productively

Working remotely (i.e. working from home) has been gradually becoming more common. In recent weeks, global health concerns have rapidly accelerated this shift, and many people who have never worked from home before will be doing so for weeks or perhaps months to come. Some companies may even decide to continue to offer remote-work opportunities if they find
Publish At:2020-03-25 21:47 | Read:163 | Comments:0 | Tags:How To business small business

Microsoft discovers two new remote code execution vulnerabilities

On March 23, Microsoft announced that it had discovered two critical vulnerabilities in Windows. The announcement was made outside the company’s regular communications schedule, highlighting how critical these vulnerabilities are. These are remote code execution vulnerabilities, and Adobe Type Manager Library. Microsoft says it is aware of a limited nu
Publish At:2020-03-25 08:30 | Read:196 | Comments:0 | Tags:Business News Security b2b Microsoft vulnerability Windows

Danger hiding in plain sight: the risks that your applications can pose

When many organizations think about cyberthreats, the first thing that comes to mind is malware. If a piece of malware makes its way into a company, it can cause serious damage. Back at the start of 2019, a piece of malware infected the servers of a Maltese bank, leading to the loss of €13 million. And ransomware, the malware that encrypts its victims’ files
Publish At:2020-03-19 10:24 | Read:169 | Comments:0 | Tags:Adaptive Defense Business b2b eBook fileless malware

Working from home: 5 tips to protect your company

Technology changes, life habits change and the way we work changes too. And however we work, one thing that does not change is the inescapable duty we have to protect our assets in order to ensure perfect business continuity, to protect the information we manage, and to maintain business secrecy. Unsurprisingly, technical complexity and an increasingly scatt
Publish At:2020-03-13 10:17 | Read:327 | Comments:0 | Tags:Business Tips b2b telework

RemoteSec: achieving on-prem security levels with cloud-based remote teams

The world of work is changing—by the minute, it feels these days. With the onset of the global coronavirus pandemic, organizations around the world are scrambling to prepare their workforce, and their infrastructure, for a landslide of remote connections. This means that the security perimeter of businesses small and large has transformed practically overnig
Publish At:2020-03-12 15:31 | Read:376 | Comments:0 | Tags:Business cloud infrastructure cloud security cloud services

Securing the MSP: best practices for vetting cybersecurity vendors

Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most reliant on third-party vendors—including those providing security. While this is generally not an indication of dysfunction or vulnerability, the responsible MSP will be looking with a critical eye while vetting cybersecurity vendo
Publish At:2020-03-11 13:20 | Read:341 | Comments:0 | Tags:Business cybersecurity vendors enterprise managed service pr

Ransomware has a new trick: pay up or suffer a data breach

There’s no denying the fact that in 2019, cybercrime’s biggest star was ransomware. Last year, successive waves of ransomware paralyzed public institutions, organizations, and companies all over the world. These attacks caused companies to lose data, brought organizations’ productivity to a halt, as well as provoking considerable economic losses due to the c
Publish At:2020-03-11 11:03 | Read:308 | Comments:0 | Tags:Business Security b2b data breach Ransomware

Enforcement of the GDPR will be strengthened in 2020

At the end of 2019, German data protection authorities indicated that they would intensify the use of the framework of sanctions of the GDPR in 2020. Initially, authorities focused primarily on monitoring, advising and supporting companies in the implementation of GDPR. Enforcement of fines In the past, we have reported on several record breaking fines. For
Publish At:2020-03-09 09:44 | Read:331 | Comments:0 | Tags:Business Security b2b data control gdpr Germany

A malwareless attack: Adaptive Defense at work….

Cryptotrojans (like Emotet) have been all over the news recently. After all, these forms of malware cause a lot of damage. But it doesn’t always have to be malware that threatens your IT infrastructure and your data. For example, brute force attacks are still a popular method used by cyber criminals to gain access to a company network. In a brute force
Publish At:2020-03-02 07:01 | Read:352 | Comments:0 | Tags:Business Security b2b Germany malwareless attacks

Aciturri Aeronáutica: cybersecurity in the manufacturing sector

These days, there’s no arguing the fact that all sectors are, to a greater or lesser degree, exposed to some kind of cyber-risks.  This is especially true in a world in which more and more organizations are using networks that are connected to external partners and providers, and are starting to adopt IoT systems, increasing the attack surface. One of the se
Publish At:2020-02-28 10:43 | Read:297 | Comments:0 | Tags:Business Case Study b2b case study industrial sector

PASS2020: the 5 biggest cybersecurity challenges for IT professionals

-The 2020 edition of the Panda Security Summit will reveal the keys to tackling the five cybersecurity challenges that enterprises have to deal with nowadays, with real, effective and innovative tactics, techniques and procedures. -On June 18, IFEMA Municipal Palace will be the meeting point for over 1,000 IT professionals from the leading companies and inst
Publish At:2020-02-27 08:10 | Read:302 | Comments:0 | Tags:Business Panda Security PASS #PASS2020 advanced cybersecurit

Blackmail attempts by ex-employees

For German companies, the damage caused by cybercrime now totals more than 40 billion euros per year. And while it is often assumed that cyberattacks are carried out by external hackers or by state sponsored agents, the reality is quite different. For example, the German Federal Bureau for Information Security (BSI) sees so-called insiders as a greater dange
Publish At:2020-02-25 10:38 | Read:386 | Comments:0 | Tags:Business Security b2b Germany insiders


Share high-quality web security related articles with you:)


Tag Cloud