HackDig : Dig high-quality web security articles

Email Fraud in 2022: What you Need to Know

With how much of our personal and professional lives take place online, it becomes more important each day for us to understand our vulnerability to cyberattacks. Cybercriminals target emails, domains, and accounts in order to impersonate identities and scam consumers and businesses alike. In 2021 alone, email spoofing and phishing increased by 220% and caus
Publish At:2022-08-01 01:06 | Read:233 | Comments:0 | Tags:Cyber Security Featured Articles cybercrime email email scam

Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats?Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’.The key target is your data. Data is valuable, and organisations have paid at least $602 million to ransomware ga
Publish At:2022-07-28 05:04 | Read:337 | Comments:0 | Tags:Cyber Security Featured Articles IBM malware power systems p

More malware-infested apps found in the Google Play store

Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware.French security researcher Maxime Ingrao described last week on Twitter how he had discovered the new malware, named “Autolycos”, and how
Publish At:2022-07-20 13:00 | Read:307 | Comments:0 | Tags:Cyber Security Featured Articles Android Google App Store Go

10,000 organisations targeted by phishing attack that bypasses multi-factor authentication

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences.The attackers used AiTM (Attacker-in-The-Middle) reverse-proxy sites to pose as Office 365 login pages which requested MFA codes, and then use
Publish At:2022-07-14 13:00 | Read:543 | Comments:0 | Tags:Cyber Security Featured Articles

Lockdown Mode: Apple to protect users from targeted spyware attacks

Apple has previewed a new feature which aims to harden high-risk users from the serious threat of being spied upon by enemy states and intelligence agencies.“Lockdown Mode” is scheduled to arrive later this year with the release of Apple iOS 16 and macOS Ventura. It’s an optional feature for users who believe their computers and smartphones
Publish At:2022-07-07 13:00 | Read:417 | Comments:0 | Tags:Cyber Security Featured Articles Apple Authentication iPhone

How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
Publish At:2022-06-26 21:07 | Read:935 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Remote working

Cyberthreat Defense Report 2022: Key Points You Should Know

Each year, CyberEdge publishes the Cyberthreat Defense Report (CDR). Aimed at IT security leaders, this comprehensive report outlines the threats, security issues, and industry concerns that are most pressing.Information summarized in the CDR is gathered through surveys conducted in 17 countries and 19 industries. Respondents are IT decision-makers in organi
Publish At:2022-06-20 02:14 | Read:441 | Comments:0 | Tags:Cyber Security Featured Articles Cyberthreat Report cyber

Reexamining the “5 Laws of Cybersecurity”

Nearly a year ago, journalist Martin Banks codified “Five Laws of Cybersecurity”. Cybersecurity is a complicated field, and any way to simplify its many facets into short, easy-to-remember maxims is always welcome. The five laws are a very good start towards developing a robust security program. The laws are:Treat everything like it’s vulnerable.Assume peopl
Publish At:2022-06-20 02:14 | Read:391 | Comments:0 | Tags:Cyber Security Featured Articles best practice cybersecurity

5 Potential Solutions to the Cybersecurity Talent Shortage

The most relevant cybersecurity threat to most businesses may be human, not technical. A sudden wave of cybercrime paired with longstanding tech labor challenges has created a cybersecurity skills gap, leaving companies without the expertise they need.Some companies lack dedicated security staff entirely, while others have a small, overworked department tryi
Publish At:2022-05-09 02:08 | Read:1692 | Comments:0 | Tags:Cyber Security Featured Articles employees finding talent re

Building Cyber Resilience in a heightened alert environment

There has been a lot of talk about cyber weapons and the cyber dimension of global politics after the NotPetya and WannaCry attacks of 2017 and the Stuxnet worm, first discovered in 2010, when it was used to attack the control mechanisms of Iran’s uranium enriching centrifuges.Professor Ciaran Martin CB, former CEO of the UK National Cyber Security Centre (N
Publish At:2022-03-10 02:07 | Read:955 | Comments:0 | Tags:Cyber Security CISA Cyber Attacks cyber resilience NCSC risk

How to Stimulate Organizations’ Security Awareness Training Programs

We all know how important security awareness training is for an organization. Moreover, we try to enhance our efforts by weaving security into the “culture” of the organization. Yet, from the employee’s perspective, it all gets very stale. It seems like it is always the same message, but if that is the case, why hasn’t this knowledge been ado
Publish At:2022-03-03 02:07 | Read:1027 | Comments:0 | Tags:Cyber Security cyber security culture Human Security Awarene

Prioritizing Cybersecurity Throughout All Web Development Sprints

No one doubts the importance of cybersecurity in web development — and yet, often in the development cycle, we neglect to prioritize it across each sprint and into the final product. Making cybersecurity a priority throughout every development sprint cycle is necessary to combat the tide of digital attacks threatening the modern web. But how can you ensure y
Publish At:2022-02-17 02:07 | Read:2352 | Comments:0 | Tags:Cyber Security best practice web development Web Security se

The Winter Olympics and Cybercrime: Caution Is Urged

Hosting the Olympics is always a source of national pride for any nation chosen to do so. Whether in winter or summer, the prestige of the world’s eyes being on an event that transcends political differences and has sport at the fore is a prize many countries and regions aspire to achieve.This all sounds fantastic and at one level is exactly what is happenin
Publish At:2022-02-15 09:58 | Read:1358 | Comments:0 | Tags:Cyber Security cybercrime data theft malware Olympic Games P

Tips for Defending Against Adversarial Actions Regardless of Their Origin

When an unfortunate event occurs, people tend to be curious about who was responsible for the event. It can be interesting and helpful to know who your enemy is and what their motives might be. But in cybersecurity, the primary focus is ultimately on preventative and detective measures to avoid similar issues.Let’s use a recent example to illustrate this poi
Publish At:2022-01-20 02:06 | Read:1079 | Comments:0 | Tags:Cyber Security Adversary APT cyberattack IT OT Policies and

Key Considerations for Canada’s Forthcoming National Cyber Security Strategy

On December 16, Prime Minister Justin Trudeau released mandate letters tasking his ministers of national defense, foreign affairs, public safety, and industry to develop a new “National Cyber Security Strategy.” He specifically highlighted the need for the strategy to “articulate Canada’s long-term strategy to protect our national security and economy, deter
Publish At:2022-01-06 02:05 | Read:1272 | Comments:0 | Tags:Government Canada Cyber Security cybersecurity policy Securi


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud