HackDig : Dig high-quality web security articles for hackers

A Look at the Legal Consequence of a Cyber Attack

Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it. Otherwise, you could be at risk of lengthy legal battles that result in hefty fines. Beyond that, the cost in terms of reputational loss could be catastrophic if not ha
Publish At:2021-01-26 00:56 | Read:272 | Comments:0 | Tags:Featured Articles cyber attack data breach legal cyber

Multiple government agencies hacked by Russia-backed actors

Multiple agencies in the USA have been hacked by a group of foreign-state bad actors tied to Russia. The affected government agencies include the U.S. Treasury, Commerce departments, and possibly many U.S. entities. According to a story published by Reuters, hackers have been monitoring government agencies’ internal emails. The cybercriminals have like
Publish At:2020-12-23 12:10 | Read:338 | Comments:0 | Tags:Mobile News News Security cyber attack cybersecurity governm

Capcom hacked. Resident Evil game developer discloses cyber attack

Japanese game developer Capcom has revealed that it suffered a security breach earlier this week which saw malicious hackers access its internal systems.The maker of such well-known video games as “Resident Evil” and “Street Fighter” disclosed in a short press release that in the early hours of Monday some of its networks “exper
Publish At:2020-11-05 11:07 | Read:456 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Capcom cyb

Being Cyber Resilient Is Critical for the Maritime Industry

Cyber-attacks against maritime and shipping organizations are only increasing. Notwithstanding the IMO’s requirement for organizations in this sector to achieve cyber resilience by 2021, more and more entities are being crippled by malicious attacks.Maritime cyber-attacks are increasingThe last victim in a long list of cyber-attacks was cruise operator Carni
Publish At:2020-09-30 12:20 | Read:396 | Comments:0 | Tags:Cyber Security Featured Articles cyber attack cyber resilien

What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring

We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS controls as they provide a critical baseline for maintaining our security framework and keeping
Publish At:2020-04-09 02:33 | Read:1526 | Comments:0 | Tags:File Integrity Monitoring attack vector cyber attack File In

How Just Opening A Malicious PowerPoint File Could Compromise Your PC

A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office.The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threa
Publish At:2017-08-14 18:50 | Read:5231 | Comments:0 | Tags:Cyber Attack hacking news Malware Microsoft office Microsoft

WannaCry vs. Petya: Keys to Ransomware Effectiveness

By Daniel MiesslerWith WannaCry and now Petya we’re beginning to see how and why the new strain of ransomware worms are evolving and growing far more effective than previous versions.I think there are 3 main factors: Propagation, Payload, and Payment.*Propagation: You ideally want to be able to spread using as many different types of techniques a
Publish At:2017-06-29 06:35 | Read:4091 | Comments:0 | Tags:#WannaCry cyber attack cybersecurity cyberwar cyberwarfare d

Post #WannaCry Reaction #127: Do I Need a Pen Test?

By Daniel MiesslerIn the wake of WannaCry and other recent events, everyone from the Department of Homeland Security to my grandmother are recommending penetration tests as a silver bullet to prevent falling victim to the next cyber attack. But a penetration test is not a silver bullet, nor is it universally what is needed for improving the security po
Publish At:2017-05-20 01:45 | Read:4144 | Comments:0 | Tags:#WannaCry cyber attack daniel meissler ioactive penetration

How to Protect Your E-commerce Business from Cyber Attacks

Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.Whether small, medium or large, every business is, sadly, at the mercy of hackers who will exploit every opportunity they get to breach sen
Publish At:2017-03-23 16:10 | Read:7146 | Comments:11 | Tags:Cyber Security Featured Articles cyber attack E-commerce SSL

Hacking Robots Before Skynet

By Cesar Cerrudo (@cesarcer)and Lucas Apa (@lucasapa)Robots are goingmainstream in both private and public sectors - on military missions,performing surgery, building skyscrapers, assisting customers at stores, as healthcareattendants, as business assistants, and interacting closely with our familiesin a myriad of ways. Robots are already showing up in many
Publish At:2017-03-01 15:50 | Read:32876 | Comments:0 | Tags:cesar cerrudo cyber attack cybersecurity hacker industrial r

A US minor is behind the cyber attack that hit Brussels airport after bombings

Prosecutors confirmed that the failed cyber attack on Brussels airport a few hours after 2016 bombings was launched by a US minor. Prosecutors confirmed that the failed cyber attack on Brussels airport a few hours after dramatic 2016 bombings in Belgium’s capital was launched by a US minor. On March 2016, suicide bombers attacked Zaventem airport and a
Publish At:2017-02-12 21:50 | Read:4288 | Comments:0 | Tags:Breaking News Cyber Crime Brussels airport cyber attack Hack

Lloyds Bank Suffered Massive DDoS Cyber Attack Lasting Two Days

Lloyds Banking Group was reportedly hit by a massive distributed denial of service (DDoS) attack lasting two days, significantly disrupting its online banking services.According to reports, the British financial institution was one of several UK banks targeted by the cyber attacks, which ran from Wednesday, January 11 to Friday, January 13.The Guardian repor
Publish At:2017-01-23 20:40 | Read:5588 | Comments:0 | Tags:Latest Security News cyber attack DDoS Lloyds DDOS

Remotely Disabling a Wireless Burglar Alarm

By Andrew Zonenberg @azonenbergCountless movies feature hackers remotely turning offsecurity systems in order to infiltrate buildings without being noticed. Buthow realistic are these depictions? Time to find out.Today we’re releasing information on a critical securityvulnerability in a wireless home security system from SimpliSafe. This system consis
Publish At:2016-11-19 20:15 | Read:8924 | Comments:0 | Tags:0-day 0day alarm Andrew Zonenberg burglar cyber attack hacki

Anti-Phishing: How the DNC could have prevented the Russian cyberattack

It’s 3:45 pm on Friday and you are ready to be done for the week. A last-minute email from your boss pops into your inbox. It’s a Google file invitation that says you need to update this document before the end of the day. Being the dedicated employee that you are, you click the link and end up at a Google login page. The login page displays your name
Publish At:2016-11-04 02:25 | Read:5086 | Comments:0 | Tags:Phishing cyber attack election phishing spear

10 Best Practices In IT Security Management Automation

In my last blog post, I introduced the topic of automation and how it can help improve security posture. In this post, we’ll be covering some of the risks automation can mitigate against.Data Breaches and Cyber AttacksA recent survey by ISACA on organization preparedness indicated that only 38% of businesses were confident they were prepared to respond to a
Publish At:2016-09-16 17:10 | Read:3942 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyber atta

Tools

Tag Cloud