HackDig : Dig high-quality web security articles for hackers

Ransomware Gangs Scavenge for Sensitive Data by Targeting Top Executives

In their attempt to extort as much money as quickly as possible out of companies, ransomware gangs know some effective techniques to get the full attention of a firm’s management team.And one of them is to specifically target the sensitive information stored on the computers used by a company’s top executives, in the hope of finding valuable data
Publish At:2021-01-11 09:56 | Read:174 | Comments:0 | Tags:Featured Articles cyberattack cybercrime ransomware

Fighting Cybercrime: We Are Stronger Together than We Are Individually

As a cybersecurity professional, how numb have you become to vendors who try to scare you with frightening statistics in an effort to sell you a new product? It is understandable that a vendor has to present as much information in a limited amount of attention-grabbing time, so their doomsday technique makes some sense. Perhaps the vendors’ approac
Publish At:2021-01-05 01:50 | Read:177 | Comments:0 | Tags:IT Security and Data Protection cyberattack cybercrime cyber

50 percent of schools did not prepare for secure distance learning, Labs report reveals

Education in the United States faced a crisis this year. The looming threat of the coronavirus—which spreads easily in highly-populated, enclosed rooms—forced schools across the country to develop new strategies for education. The dramatic stress of this transition is known. Teachers are working more hours than ever and parents are pulled between their jo
Publish At:2020-12-07 10:50 | Read:245 | Comments:0 | Tags:CTNT report CTNT cyberattack distance learning education edu

Aircraft maker Embraer admits hackers breached its systems and stole data

Embraer, a Brazilian manufacturer of aircraft, has disclosed that hackers managed to breach its computer systems, and steal data.Although Embraer may not be a household name, it is the world’s third-largest producer of civil aircraft (after Boeing and Airbus), having delivered more than 8,000 aeroplanes to date.According to a press release issued by th
Publish At:2020-12-03 13:50 | Read:321 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

How to Protect Your Business From Multi-Platform Malware Systems

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.”However, some believe that their connections to North Korea might be a false flag intending to hide the
Publish At:2020-12-03 02:08 | Read:270 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Lazarus malware

Egregor Ransomware Attack Hijacks Printers to Spit Out Ransom Notes

So, you’re a ransomware gang and you want to ensure that you have caught the attention of your latest corporate victim.You could simply drop your ransom note onto the desktop of infected computers, informing the firm that their files have been encrypted.Too dull?You could lock infected PCs and display a ghoulish skull on a bright red background (most r
Publish At:2020-11-19 10:32 | Read:394 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

The North Face resets passwords after credential-stuffing attack

An undisclosed number of customers of outdoor clothing retailer The North Face have had their passwords reset by the company, following a credential-stuffing attack.The company has revealed that on October 9, 2020, it became aware that hackers had used usernames and passwords stolen from a third-party website to gain unauthorised access to customer accounts.
Publish At:2020-11-13 10:13 | Read:337 | Comments:0 | Tags:Featured Articles IT Security and Data Protection credential

Australia Proposes Security Law to Protect Critical Infrastructure Against Cyber Attacks

The Australian Government is committed to protecting the essential services all Australians rely on by uplifting the security and resilience of critical infrastructure.Increasingly interconnected and interdependent critical infrastructure is delivering efficiencies and economic benefits to operations. However, connectivity without proper safeguards creates v
Publish At:2020-10-26 01:31 | Read:475 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Australia

Social Engineering: Hacking Brains…It’s Easier than Hacking Computers

The audience in the room is weirdly quiet. The contestant is in a small plexiglass booth with nothing but a phone, a laptop computer and some notes. On a set of speakers outside, the booth broadcasts the sounds of a dial tone as a woman on the stage begins to dial a number. It is apparent she is not phoning a friend. The dial tone changes to a ring tone, and
Publish At:2020-07-30 15:36 | Read:555 | Comments:0 | Tags:Featured Articles Security Awareness cyberattack cybersecuri

Using “Update.exe” as a Case Study for Robust OT Cybersecurity

In 2020, car manufacturer Honda fell victim to a ransomware attack. Using a payload called “update.exe,” the attack crippled Honda’s international customer service and Financial Services wing for days. Although it affected two customer facing branches of this global corporation, the ransomware was designed to target and breach Honda’s critical ICS/SCADA envi
Publish At:2020-07-07 00:04 | Read:612 | Comments:0 | Tags:Featured Articles ICS Security cyberattack ICS security malw

5G Technology: How to Make Sure the Benefits Outweigh the Security Risks

It’s hard not to say that 5G technology brings a lot of benefits. 5G entails faster download speeds, and yes, if you have a 5G-enabled handset, you could hear and appreciate the speed increases for videos, gaming, etc. However, 5G provides added benefits that go way above those for the everyday user.Let’s take a look at the high speed and low latency of 5G.
Publish At:2020-04-19 23:42 | Read:1219 | Comments:0 | Tags:Vulnerability Management cyberattack Network Security Techno

A cyberattack paralyzes coronavirus testing center

Right now, many countries are in a state of alarm, and people and organizations around the world are coming together to face the current coronavirus COVID-19 pandemic. Companies are also making efforts to streamline the adoption of new methodologies such as telecommuting in order to protect their employees’ health. However, it also also the case that t
Publish At:2020-03-27 11:51 | Read:991 | Comments:0 | Tags:Business News b2b coronavirus cyberattack hospital Virus

Four Important Steps to Secure the United States 2020 Election

It’s an unfortunate reality that cyber attacks on the U.S. 2020 election are likely to happen. However, while this is a potent threat to democracy, an even greater threat is to not take the necessary actions to prevent these attacks until it is too late.There are many different types of cyberattacks that the U.S. 2020 election could face.Attacks on electroni
Publish At:2020-03-10 02:17 | Read:1243 | Comments:0 | Tags:Government IT Security and Data Protection cyberattack elect

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. The purpose of threat modeling is to provide defenders with a systematic analysis of the probable attacker’s profile, the most likely attack vectors and the assets most desired by an attacker. Ef
Publish At:2020-02-27 09:41 | Read:1689 | Comments:0 | Tags:Application Security Security Intelligence & Analytics Appli

National Veterinary Associates catches dose of ransomware

byDanny BradburyRansomware attacks don’t discriminate. They are just as happy targeting those with four legs as those with two.Anonymous sources told cybersecurity reporter Brian Krebs this week that National Veterinary Associates (NVA) has fallen victim to a ransomware attack that has affected hundreds of hospitals.NVA describes itself as one of the l
Publish At:2019-11-26 12:35 | Read:1882 | Comments:0 | Tags:Data loss Malware Ransomware Security threats cyberattack ma

Tools

Tag Cloud