HackDig : Dig high-quality web security articles for hacker

DragonOK APT is adopting new tactics, techniques and procedures

Researchers at Palo Alto Networks recently observed the DragonOK APT group adopting new tactics, techniques and procedures. China-linked cyber espionage group DragonOK is back, security experts from Palo Alto Networks have uncovered a new campaign leveraging the KHRAT remote access Trojan (RAT). The DragonOk group (also known as NetTraveler (TravNet), PlugX,
Publish At:2017-09-03 00:00 | Read:5652 | Comments:0 | Tags:APT Breaking News Cyber Crime China corporate espionage Cybe

China-Linked DragonOK APT Group continues updating tools and tactics

The China-linked DragonOK continues updating tools and tactics and targeted entities in various countries, including Russia and Tibet. It was September 2014, when security researchers at FireEye spotted for the first time the cyber espionage activities of a Chinese state-sponsored group dubbed DragonOK. At the time, FireEye discovered two hacking campaigns c
Publish At:2017-01-07 13:45 | Read:4743 | Comments:0 | Tags:APT Breaking News Cyber Crime Hacking Intelligence China cor

Hacking enterprise wireless Printers with a drone or a vacuum cleaner

A group of researchers from the iTrust has demonstrated how to use a Drone to intercept wireless printer transmissions from outside an office building. Recently I wrote a blog post on the Infosec Institute titled “Modern Physical Security Awareness Is More Than Dumpster Diving” where I explain how the concept of
Publish At:2015-10-07 15:10 | Read:4902 | Comments:0 | Tags:Breaking News Hacking Security corporate espionage Drone phy

Company’s data at risk due to the use of mobile gambling apps

Veracode has conducted a research on the security of several mobile gambling apps and discovered a number of flaws that expose enterprises to serious risks. If you belong to a global corporation, the most probably think you will find out is that some of your colleagues have installed mobile apps that don’t belong to the work e
Publish At:2015-09-03 17:15 | Read:3520 | Comments:0 | Tags:Breaking News Hacking Security BYOD corporate espionage gamb

War shipping, hacking corporate WLan with a Raspberry Pi board

Security expert Larry Pesce has designed a war shipping board-sized package that could be used to hack wireless networks through the post. The corporate espionage is considered one of the most dangerous threats for private business, but also for government entities, we have discussed in the past about various kinds of offensiv
Publish At:2014-10-05 13:30 | Read:5072 | Comments:0 | Tags:Hacking corporate espionage iSniff Raspberry Pi War Shipping

FireEye uncovered two cyber espionage campaigns operating in parallel from China

FireEye discovered two distinct groups of Chinese hackers operating cyber espionage campaigns on a large-scale in parallel. Security experts at FireEye have discovered two hacking campaigns conducted by distinct groups operating in separate regions of China that seems to work in parallel. The first team of hackers, named Moafe
Publish At:2014-09-12 23:40 | Read:4213 | Comments:0 | Tags:Cyber Crime Hacking China corporate espionage Cyberespionage

Dyre Zeus variant malware used for corporate espionage

Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the name of a new variant of the immortal Zeus banking trojan worries cyber security experts, this new strain doesn’t limit its stealing activity to user’s banking credentials, bu
Publish At:2014-09-12 03:00 | Read:6096 | Comments:0 | Tags:Cyber Crime Malware corporate espionage cyber espionage Cybe


Share high-quality web security related articles with you:)


Tag Cloud