HackDig : Dig high-quality web security articles for hacker

Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise

Indicators of compromise (IoCs) are artifacts such as file hashes, domain names or IP addresses that indicate intrusion attempts or other malicious behavior. These indicators consist of: Observables — measurable events or stateful properties; and Indicators — observables with context, such as time range. IoCs are crucial for sharing threat information and
Publish At:2017-09-18 17:25 | Read:3226 | Comments:0 | Tags:Fraud Protection Incident Response Cyberattacks Incident Res

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:2020 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:3007 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Corporate Cybersecurity: Keep Up, or Die

Companies are more vulnerable than ever to cyberattacks, as their CIOs will be quick to explain to anyone who cares to ask. A third of them acknowledge that their company has suffered a major cyberattack in the last two years, an increase of 45% compared to 2013. And only one in five IT managers claims to be “very well prepared” to respond to cyb
Publish At:2017-06-06 19:40 | Read:2471 | Comments:0 | Tags:Security companies cyberattacks Cybercrime gdpr

Threat Intelligence in the Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionizing warfare. Whereas security threats were once visible and easily identifiable, today’s cyberthreats are invi
Publish At:2017-05-05 20:20 | Read:2875 | Comments:0 | Tags:CISO Risk Management Security Intelligence & Analytics Cyber

The Cyberattack that Put an Entire City on High Alert

  As more and more pieces of our environment get connected to the Internet, the number of potential targets of a cyberattack becomes staggering, and the possible consequences become increasingly worrisome. Take what happened recently in Dallas, TX, where most of the city’s population was woken up in the middle of the night to the wailing of sirens becau
Publish At:2017-04-19 19:55 | Read:2400 | Comments:0 | Tags:News critical infrastructure cyberattacks Smart Cities

Attacks That Change the Course of History

Data theft is steadily refashioning itself as a political weapon. This past December, Barack Obama took advantage of his final days in office to take retaliatory measures against Russia. The Obama administration attributes to its Muscovite counterpart the cyberattacks carried out over the course of the recent presidential elections whose goal it was to tip t
Publish At:2017-01-09 13:20 | Read:2925 | Comments:0 | Tags:News cyberattacks security

Can a Hacker Guess Your Password in Only 100 Attempts?

Making sure that our employees use complex and diverse passwords, both in and out of the workplace, is of vital importance. Not least because multitudes of confidential data could be at risk because of flimsy credentials, ones that are obvious and oft-repeated. To demonstrate the necessity of adequate protection that also allows for the handling of many dist
Publish At:2016-12-29 16:55 | Read:2378 | Comments:0 | Tags:Security businesses cyberattacks passwords

66% of Organizations Unprepared to Recover from Cyberattack, Study Finds

Organizations around the globe remain unprepared to prevent, detect and respond to cyber attacks, revealed a recent study conducted by the Ponemon Institute.The 2016 Cyber Resilient Organization study surveyed over 2,400 security and IT professionals from the U.S., U.K., France, Germany, United Arab Emirates, Brazil and Australia.Of the respondents, 66 perce
Publish At:2016-11-22 05:30 | Read:2778 | Comments:0 | Tags:Latest Security News Cyberattacks Ponemon Institute resilien

Threat Recap: Week of May 16th

A lot happens in the security world and many stories get lost in the mix. In an effort to keep our readers informed and updated, we present the Webroot Threat Recap, highlighting 5 major security news stories of the week. TeslaCrypt Closing It’s Doors Here’s a bit of good ransomware news, for once. This week, it was brought to the attention of th
Publish At:2016-05-21 07:05 | Read:3505 | Comments:0 | Tags:Europe Headlines US Apple Breach Bug Bounty cyber attacks Cy

Loco Motives? Hacker Attacks Could Derail Train Cybersecurity, Researchers Say

It’s hard to argue with efficiency in tech or transportation. Despite the availability of air freight and commercial trucking services, trains stand out as both efficient and cost-effective when it comes to moving large quantities of material goods. According to SecurityWeek, however, the supervisory control and data acquisition network (SCADA) systems
Publish At:2016-01-12 21:40 | Read:2822 | Comments:0 | Tags:Advanced Threats Industries Cyberattacks Cybercrime Energy a

Don’t Let the Fox Guard the Henhouse: Protect Your Sensitive Data From the Insider Threat

Ever hear the expression “don’t let the fox guard the henhouse”? The farmer knows his chickens are valuable and puts them in a safe coop with a lock and a roof, protecting them from external threats such as opossums, cats and hawks. But what is the farmer doing to protect from within the coop? There are measures the farmer has to take — sta
Publish At:2016-01-06 02:55 | Read:3197 | Comments:0 | Tags:Data Protection Cyberattacks Insider Threat

The InfoSecond, Aug. 24–28: Cyberattacks, Ashley Madison and More!

It’s a new week, which means we’ve got another edition of the InfoSecond to help keep you updated on the biggest stories in cybersecurity. This week’s entry highlights the most infamous cyberattacks of the 21st century, the era of cybercrime, hacker myths, blurred lines in security research, an automobile hack and the discovery of new vulne
Publish At:2015-09-02 22:35 | Read:2437 | Comments:0 | Tags:Data Protection Ashley Madison Cyberattacks Data Breach Info

64% of Organizations are Potential Targets for Nation-State Cyberattacks, says Survey

According to a recent survey conducted at this year’s Black Hat USA security conference, nearly two-thirds of organizations are potential targets for nation-state cyberattacks.The survey conducted by Tripwire, which includes responses from 215 conference attendees, also found that 86 percent of those questioned have seen an increase in these targeted attacks
Publish At:2015-08-17 18:45 | Read:2852 | Comments:0 | Tags:Latest Security News black hat Cyberattacks Survey

The 10 Most Common Application Attacks in Action

Nowadays, application development is moving more and more onto the Web. The Web hosts entire productivity suites such as Google Docs, calculators, email, storage, maps, weather and news — everything we need in our daily lives. Our mobile phones are useless without the Internet since nearly all mobile applications connect to the cloud, storing our pictures, u
Publish At:2015-04-09 01:25 | Read:3807 | Comments:0 | Tags:Application Security Software & App Vulnerabilities Cross-Si


Share high-quality web security related articles with you:)


Tag Cloud