HackDig : Dig high-quality web security articles for hackers

MSPs, have you picked the right PSA for you yet?

Not long ago, we helped MSPs pick the right remote monitoring and management (RMM) platform for them, and make it an essential part of their service toolkit. As you may recall, an RMM is a tool that helps MSPs do the work. And what better way to track the work—and other elements associated with it—than to have professional service automation (PSA) software d
Publish At:2021-01-15 18:06 | Read:114 | Comments:0 | Tags:Business Enterprise Resource Planning ERP how to choose a PS

Aether XI release delivers protection for Windows on ARM

The long-awaited ARM processor revolution has finally arrived. ARM processors, which started out by conquering mobile devices, suddenly seemed to be an interesting, viable alternative for servers, desktops, and laptops and many companies invested in what was believed to be a surefire future trend in the technology industry. Yet as the years went by, ARM solu
Publish At:2021-01-14 06:46 | Read:87 | Comments:0 | Tags:Business Panda Security Products aether ARM b2b Windows

Do you know the Impact of COVID-19 on the Security Threat Landscape?

Q3 2020 Internet Security Report sheds light on COVID-19 threat trends, growing network attacks, malware targeting U.S. SCADA systems, and more. Panda, a WatchGuard brand, announced the release of its Internet Security Report for Q3 2020. Top findings from the research reveal how COVID-19 has impacted the security threat landscape, with evidence that attacke
Publish At:2020-12-16 08:10 | Read:266 | Comments:0 | Tags:Business News Panda Security advanced cybersecurity b2b quar

COVID-19: the impact of the pandemic in three IT areas

The impact of the COVID-19 pandemic on society has led to a digital transition period with organizations and businesses having to rapidly rewrite their plans for the immediate future. As companies set out to address these new scenarios, the need for expert technical support has become increasingly evident, and vital in order for investment and implementation
Publish At:2020-12-02 09:10 | Read:218 | Comments:0 | Tags:Adaptive Defense Business News b2b covid-19 MSP WatchGuard

Cybersecurity predictions for 2021: automation set to drive spear phishing campaigns

In August, a cybersecurity webinar for US federal agents set out the leading security trends in their field. The event was attended by leading experts and cybersecurity directors from organizations such as the public/private partnership ACT-IAC and the US space agency NASA. The latter’s CIO, Mike Witt, explained, “We’ve got to get away from the mind-set of ‘
Publish At:2020-11-26 08:52 | Read:285 | Comments:0 | Tags:Business News Panda Security b2b cybersecurity predictions W

16 hardware and software platforms hacked in minutes. A contest or business reality?

To date in 2020, the Spanish Data Protection Agency (AEPD) has reported 837 security breaches affecting personal data, which is 201 more than those reported in the same period last year. Yet one in three of these are still without a security incident response plan, which underlines how the security teams charged with this task and with providing a forensic r
Publish At:2020-11-17 10:22 | Read:298 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b cyberat

Rakuten sends cashback emails to customers in error

Japanese e-commerce giant Rakuten had sent email notifications yesterday to many of its customers congratulating them on newly earned cashback.Today, they took their words (and the cash) back, informing the customers the communication had been sent in error.Periodic cashback emails from Rakuten Rewards, formerly Ebates, are frequently sen
Publish At:2020-11-12 11:30 | Read:305 | Comments:0 | Tags:Technology Business

The cold cyberwar and geopolitics: which weapons can protect endpoints?

Following World War II, the technological and arms race that began between the United States and the Soviet Union became known as the Cold War. The Cold War nowadays has entered into a new phase: cyberwarfare. Technology is increasingly being used to gain a competitive edge in global geopolitics, and governments are increasingly concerned about the strength
Publish At:2020-11-05 09:45 | Read:383 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b covid-1

Numerous points of entry lead to multi-million euro penalties for data security breaches.

Data security breaches are now among the most common serious incidents affecting businesses. In this respect, 2019 was a bad year for companies. It was a year that saw some of the highest penalties imposed for violating data protection regulations, with examples such as the 50 million euro fine on Google LLC for non-compliance with GDPR transparency rules an
Publish At:2020-10-29 09:40 | Read:378 | Comments:0 | Tags:Adaptive Defense Business News b2b data breach data control

Artificial Intelligence, disruptive innovation in cybersecurity

In the current reality in which the sheer number, professionalization, and sophistication of adversaries has forced organizations to bolster security policies and develop specific processes to prevent, detect, investigate, contain, and eradicate technologically advanced cyberattacks, Artificial Intelligence has burst onto the cybersecurity scene. AI has, in
Publish At:2020-10-22 06:27 | Read:273 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

Measures to implement against critical vulnerabilities: Zerologon the Windows Netlogon security hole

Zerologon is the latest critical vulnerability detected in the Windows Server OS affecting all versions from 2008 up to the latest available from Microsoft. This vulnerability has a severity rating of 10.0, and there are already PoCs that can easily exploit the flaw. Get all the information you need about recent critical and serious vulnerabilities for which
Publish At:2020-10-16 06:09 | Read:419 | Comments:0 | Tags:Business News b2b patch management vulnerabilities Zerologon

Five keys for mitigating cybersecurity breaches

A rapid and efficient response to incidents is a key part of any good cybersecurity strategy. As cyberattacks evolve at pace, IT departments start to question traditional methods of dealing with new criminal gangs and threats, and understand that there is no single or simple way to counter them, given the complexity of the digital environment. Today, an effe
Publish At:2020-10-14 11:15 | Read:374 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b technol

Healthcare security update: death by ransomware, what’s next?

A recent ransomware attack which played a significant role in the death of a German woman has put into focus both the dangers and the importance of cybersecurity today. But it has also led some to point fingers as to who was responsible. As usual, playing the blame game helps no one, but it does remind us of the dire need to work on healthcare security.
Publish At:2020-10-08 15:29 | Read:509 | Comments:0 | Tags:Business Vital infrastructure DoppelPaymer healthcare securi

The four areas that all cybersecurity policies should keep in mind

Just a few hours ago, we have seen how the low-cost airline Vueling, part of the IAG (Iberia) group, and the courier service Nacex, along with at least seven other smaller firms, have fallen victim to a vulnerability that exposed the data of thousands of employees who used the online learning services of the firms. And it is not the first time that such atta
Publish At:2020-10-06 08:39 | Read:275 | Comments:0 | Tags:Business News Tips advanced cybersecurity b2b vulnerabilitie

Carlos Arnal: “The economic impact of a DNS attack is too great to ignore the vulnerabilities that would enable it”

One of the main problems with DNS attacks is the increasing cost of the damage they cause, as well as their rapid evolution and the diverse range of attack types. Data exfiltration over DNS is a major concern in corporate environments. In order to protect themselves, organizations are prioritizing the security of network endpoints and improving DNS traffic m
Publish At:2020-09-30 12:13 | Read:338 | Comments:0 | Tags:Adaptive Defense Business advanced cybersecurity b2b dns int

Tools

Tag Cloud