HackDig : Dig high-quality web security articles for hacker

Protecting Legacy Applications from Attacks with Modern Hardware Isolation

Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of cybersecurity d
Publish At:2017-09-11 10:00 | Read:212 | Comments:0 | Tags:Company News detection Isolation legacy legacy apps Micro-VM

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the c
Publish At:2017-08-03 12:45 | Read:605 | Comments:0 | Tags:Innovation cybersecurity detection intelligence management p

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:283 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:387 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

As WannaCry went nuts last week and everyone moved quickly to support one another; we all moved on our best intelligence at the time. Because most ransomware is typically delivered via email, website or file, we worked with our customers to make sure their endpoints were protected. One week later, I wanted to take a moment to be absolutely transparent about
Publish At:2017-05-20 10:20 | Read:674 | Comments:0 | Tags:Company News breach crypto-malware detection enterprise Isol

Deception as a {Free} Post-Breach Detection Tool

The Clifford Stoll’s interesting story of stalking the wily hacker back in the 80s was probably the first time deception was used for catching a hacker. Since then, the technology has changed a lot, but the concept of honeypots and deception in general has remained the same.Despite the undeniable and important role that honeypots have in proactive defense st
Publish At:2017-03-08 04:10 | Read:735 | Comments:0 | Tags:Featured Articles IT Security and Data Protection breach det

DOE Awards $34M in Funding to Help Bolster Power Grid Security

The United States Department of Energy (DOE) has awarded $34 million in funding for projects aimed to protect the U.S. power grid against digital attacks.The 12 projects are still waiting congressional approval. If given the green light, they will proceed across nine states through the Energy Reliability’s Cybersecurity of Energy Delivery Systems (CEDS) prog
Publish At:2016-08-18 00:35 | Read:702 | Comments:0 | Tags:Latest Security News cybersecurity department of energy dete

Searching the Enterprise for Known Indicators of Breach

Given the recent high-profile breaches, a key challenge facing government agencies and other security-minded organizations is rooting out malware that has already become embedded on key assets.Multiple vendors are offering cloud-based sandbox analytics services, and/or on-premises appliances, that can analyze new binaries to determine if they have suspicious
Publish At:2015-07-13 19:30 | Read:990 | Comments:0 | Tags:Featured Articles Tripwire News breach detection malware tri

Ransomware Campaign Alters Variants to Evade Detection

A recently uncovered operation has been mutating versions of ransomware to better avoid getting detected.As part of the campaign, which researchers from Cambridge-based Cybereason have dubbed Kofer, attackers are tweaking certain variables of ransomware like CryptoWall 3.0 and Crypt0L0cker to evade static signature or hash-based detection. While the malwa
Publish At:2015-07-08 20:30 | Read:983 | Comments:0 | Tags:Malware Detection malware ransomware Ransomware Campaign

Zimperium Takes on Mobile World Congress 2015

Next month Zimperium has the honor of presenting on the evolution of the mobile threat landscape at Mobile World Congress, March 2-5, in Barcelona, Spain. After a record 2014, we are excited to showcase our Mobile Threat Defense system for iOS and Android devices to event attendees! Be sure to visit Zimperium at any one (or all!) of our three ex
Publish At:2015-02-19 17:05 | Read:1234 | Comments:0 | Tags:Events Mobile security News AirWatch AirWatch by VMware Andr

Security Kaizen: Adopting the Practice of Continuous Improvement to Improve Your Security Posture

In the early ’80s, the Japanese automobile industry (and Toyota in particular) popularized the idea of “Kaizen,” or continuous improvement, as a daily process of good change. Kaizen refers to activities that continuously improve all functions within a company to reduce waste and improve productivity and efficiency. In order to adopt this pr
Publish At:2015-01-05 21:35 | Read:1441 | Comments:0 | Tags:detection endpoint protection Kaizen Network Security Preven

OpenSOC: An Open Commitment to Security

According to the Breach Level Index, between July and September of this year, an average of 23 data records were lost or stolen every second – close to two million records every day.1 This data loss will continue as attackers become increasingly sophisticated in their attacks. Given this stark reality, we can no longer rely on traditional means of threat det
Publish At:2014-11-17 20:05 | Read:839 | Comments:0 | Tags:Security analytics Big Data data loss detection OpenSOC

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud