HackDig : Dig high-quality web security articles

CISO Interview Series: The challenges of being the CISO for the University of Oxford.

The job of a CISO is one of constant change and unexpected challenges.  One of the most energetic environments to govern is that of a university. Universities function not only as academic institutions, but also as research hubs, hosting both curious students, as well as notable scholars.  This is an audience not known for slow-motion progress. The
Publish At:2022-07-04 01:06 | Read:32 | Comments:0 | Tags:Featured Articles IT Security and Data Protection CISO cyber

Black Basta ransomware – what you need to know

What is Black Basta?Black Basta is a relatively new family of ransomware, first discovered in April 2022.Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations – first exfiltrating data from targeted companies, and then encrypting files on the firm’s computer systems.V
Publish At:2022-06-30 13:00 | Read:131 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

How to Protect Your Remote Workforce from a Cyberattack

Earlier this year, an industry report stated that 79% of businesses remain concerned about the security risks of an increasingly remote workforce. Cyberattacks are on the rise since the COVID-19 pandemic, in part because many organizations fail to put in place adequate cybersecurity measures and procedures.In addition, there is a worldwide shortage of cybers
Publish At:2022-06-26 21:07 | Read:271 | Comments:0 | Tags:Cyber Security Featured Articles cyberattack Remote working

How Dangerous Is the Cyber Attack Risk to Transportation?

If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and subway routes. The results could be terrible.  Between June of 2020 and June of 2021, the transportation industry witnessed a 186% increase in weekly ra
Publish At:2022-05-17 10:18 | Read:773 | Comments:0 | Tags:Mainframe Risk Management Security Services Threat Hunting c

Hospitals taken offline after cyberattack

The GHT Coeur Grand Est has become a victim of a cyberattack on the hospital centers of Vitry-le-François and Saint-Dizier. The hospital’s administration has warned [French] that data have been exfiltrated and might be used for phishing in the future. As a consequence, the GHT Cœur Grand Est has cut all incoming and outgoing internet connections from its
Publish At:2022-04-26 12:48 | Read:879 | Comments:0 | Tags:Reports cyberattack data breach GHT Coeur Grand hospital cyb

White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe

mg width="300" height="200" src="https://www.mcafee.com/blogs/wp-content/uploads/2022/03/300x200_Blog_wh-cyberattacks.jpg" class="attachment-medium size-medium wp-post-image" alt="" loading="lazy" style="margin-bottom: 15px;" srcset="https://www.mcafee.com/blogs/wp-content/uploads/2022/03/300x200_Blog_wh-cyberattacks.jpg 300w, https://www.mcafee.com/blogs/wp
Publish At:2022-03-31 16:42 | Read:477 | Comments:0 | Tags:McAfee News cyberattack White House Joe Biden Russian Cyber

EDoS: The Next Big Threat to Your Cloud

What is EDoS?Economic Denial of Sustainability (EDoS) is a cybersecurity threat targeting cloud environments. EDoS attacks exploit the elasticity of clouds, particularly auto-scaling capabilities, to inflate the billing of a cloud user until the account reaches bankruptcy or large-scale service withdrawal.EDoS attacks exploit the cloud’s economies of scale t
Publish At:2022-03-23 02:07 | Read:1919 | Comments:0 | Tags:Cloud cloud security cyberattack denial of service threat

Thousands of satellite users offline in Europe following a cyberattack, is it a conflict spillover?

Thousands of satellite internet users across Europe were disconnected from the internet by a cyber-event, experts suspect a cyber attack. Orange confirmed that “nearly 9,000 subscribers” of a satellite internet service provided by its subsidiary Nordnet in France were offline following a “cyber event” that took place on February 24
Publish At:2022-03-05 06:25 | Read:815 | Comments:0 | Tags:Breaking News Hacking Security cyberattack hacking news info

US legislation brings mandatory cyberattack and ransomware reporting one step closer

The US Senate has passed legislation designed to improve the cybersecurity of the Federal Government.The legislation, which consists of three bills, was unanimously passed by the Senate on Tuesday evening, and would – amongst other things – require organisations working in critical industry sectors to alert the US Government about hacks and ranso
Publish At:2022-03-03 11:15 | Read:536 | Comments:0 | Tags:Government cyberattack law enforcement legislation ransomwar

How to Take Care of Yourself When Things Go Wrong: Self-Care Tips When Dealing with a Cyber Attack

One very predictable part of cybersecurity is that the work is unpredictable.  here are routines that help to create a predictable rhythm, but you don’t necessarily know when the next attack will come, how intense it will be when it does, or when you will get to go back to a predictable and hopefully manageable rhythm again. When responding to a cr
Publish At:2022-02-17 02:06 | Read:766 | Comments:0 | Tags:Featured Articles IT Security and Data Protection cyberattac

News Corp falls victim to cyberattack

Media giant News Corp says it has fallen victim to a cyberattack. First analysis indicates that the attack was a state sponsored attack, aimed at emails and documents of News Corp employees, including journalists. News Corp says data was stolen, but that it didn’t include financial data or subscriber information. The hack also affected financial ne
Publish At:2022-02-07 16:42 | Read:890 | Comments:0 | Tags:Reports cyberattack News Corp cyber

6 Things Cyber Insurers Are Looking for in Cyberattack Claim Applications

The modern digital environment is more risky than ever before, and the incidence of cyberattacks only increased throughout the COVID-19 pandemic. In this day and age, even the most robust security systems may still be penetrated or breached by a sophisticated cyber-attack. This means companies can no longer afford to be complacent about security.If a breach
Publish At:2022-01-20 02:06 | Read:2581 | Comments:0 | Tags:IT Security and Data Protection Cyber Insurance cyberattack

Tips for Defending Against Adversarial Actions Regardless of Their Origin

When an unfortunate event occurs, people tend to be curious about who was responsible for the event. It can be interesting and helpful to know who your enemy is and what their motives might be. But in cybersecurity, the primary focus is ultimately on preventative and detective measures to avoid similar issues.Let’s use a recent example to illustrate this poi
Publish At:2022-01-20 02:06 | Read:934 | Comments:0 | Tags:Cyber Security Adversary APT cyberattack IT OT Policies and

9-1-1 There’s Been A Data Breach

In this episode, Lisa Forte, partner at Red Goat Cybersecurity, discusses what happens when organizations go unprepared for an inevitable cyber breach. She explains how practicing your breach plan is the best line of defense in preparing your strategy.Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-
Publish At:2021-12-07 09:57 | Read:1348 | Comments:0 | Tags:Podcast cyberattack data breach data breach response Data Le

Sophisticated Tardigrade malware launches attacks on vaccine manufacturing infrastructure

Security researchers are warning biomanufacturing facilities around the world that they are being targeted by a sophisticated new strain of malware, known as Tardigrade.The warning comes from the non-profit Bioeconomy Information Sharing and Analysis Center (BIO-ISAC) which revealed that at least two large facilities working on manufacturing bio-drugs and va
Publish At:2021-11-25 13:52 | Read:1550 | Comments:0 | Tags:IT Security and Data Protection cyberattack malware Pharmace


Share high-quality web security related articles with you:)
Tell me why you support me <3