HackDig : Dig high-quality web security articles for hacker

Thick Client Penetration Testing – 3(JavaDeserialization Exploit: RCE)

Thick Client Penetration Testing – 3 (Java Deserialization Exploit: Remote Code Execution) Welcome Readers, in the previous two blogs, we have learnt about the various test cases as well as setting up traffic for thick clients using interception proxy. Among the plethora of test cases out here, one particularly interesting is about “Remote Code Execution on
Publish At:2017-08-05 02:15 | Read:4314 | Comments:0 | Tags:News exploit

HBO hacked: Not even Daenerys dragons can protect Game of Thrones from leak

As you have probably heard already, hackers might be holding 1.5 terabytes of HBO proprietary information. No one knows what kind of information they have managed to steal, but one is for sure, the Game of Thrones script for season 7 has been reported as leaked. On Sunday afternoon reporters received an anonymous email saying: “Hi to all mankind. The greates
Publish At:2017-08-02 04:55 | Read:2252 | Comments:0 | Tags:Mobile News News cyberattack Game of thrones hack HBO

PandaLabs Records a 40% Increase in Attacked Devices this Quarter

Traditional security solutions, although efficient in protecting against known malware, are incapable of protecting against attacks that use non-malicious tools and other advanced techniques. This argument has gained traction in recent investigations carried out by PandaLabs, the anti-malware laboratory at Panda Security. The laboratory presents its second q
Publish At:2017-08-01 10:30 | Read:2608 | Comments:0 | Tags:News PandaLabs cybersecurity Malware quarterly report

Thick Client Penetration Testing- 1

Why thick client penetration testing? Thick client applications are not new having been in existence for a long time, however if given to perform a pentest on thick clients, it is not as simple as a Web Application Pentest. Thick clients are majorly used across organizations for their internal operations. In this series of articles, we will learn various to
Publish At:2017-07-29 22:25 | Read:2150 | Comments:0 | Tags:News

Thick Client Penetration Testing – 2 ( Traffic Analysis)

After getting the basics of thick client pentest, let’s delve into the very first steps you can take to commence thick client pentest. Interception and setting up proxy of application. Thick clients can be broken down into two types based on proxy settings: Proxy aware Proxy unaware Proxy aware are those applications which has settings in the application i
Publish At:2017-07-29 22:25 | Read:2595 | Comments:0 | Tags:News

The biggest cybersecurity breaches of 2017…so far

What can we learn from the latest cybersecurity breaches The frequency and impact of cybercrime has been steadily escalating for several years now, but 2017 has been one of the worst– at least in terms of media headlines. Worse still, we’re only half way through the year. So what has happened, and what can you learn? NSA hacking tools are stolen and leaked T
Publish At:2017-07-11 08:20 | Read:2311 | Comments:0 | Tags:Mobile News News cybersecurity Hackers Ransomware

Cybersecurity Debate on the Agenda at the G20

In today’s geopolitical moment, attacks against the privacy of large companies and individuals have become one of the great dangers of life online. Many large organizations have yearly budgets in the millions for security programs and protocols to secure their networks. Ostensibly, they are shielding their customers’ data, but it is also an investment
Publish At:2017-07-10 13:55 | Read:2167 | Comments:0 | Tags:News cybersecurity cyberwarfare g20

New WhatsApp updates on the way – how to stay safe

Tips to be protected against WhatsApp malware As the most popular messaging application of all time, you would expect WhatsApp to be updated with new features quite regularly. Sure enough, a new update is due to arrive in a matter of days, offering several new functions that will make the app even more useful. But like every new update, you need to take care
Publish At:2017-06-29 20:10 | Read:2155 | Comments:0 | Tags:Mobile News News Android cybersecurity Malware WhatsApp

GoldenEye/Petya Attack Spreads Rapidly, Recalling WannaCry

On June 27, 2017, a large-scale attack using a variant of the ransomware family known as GoldenEye affected much of the world. In addition to encrypting files on the computer, this ransomware family is characterized by encrypting the MBR when it has permissions, thus blocking full access to the computer. The attack can almost be seen as a replica of the much
Publish At:2017-06-28 07:20 | Read:2560 | Comments:0 | Tags:Malware News goldeneye PandaLabs petya Ransomware

Panda Security and Stormshield Announce a European Technology Alliance Against Cyber Threats

Panda Security, the Spanish multinational leader in endpoint security solutions, and Stormshield, the French leader in enterprise network protection, have announced the establishment of a European strategic alliance, combining their expertise to more efficiently secure companies’ IT infrastructures and environments and help them with their digital transforma
Publish At:2017-06-27 12:55 | Read:2112 | Comments:0 | Tags:News Panda Security cybersecurity stormshield technological

The importance of teaching cyber security in schools

Teaching the next generation of cyber security specialists The threat of cybercrime has moved from attacks on individuals to full-scale war in the shadowy corners of the Internet. With every major incident comes a suspicion that teams of hackers are being financed by national governments to carry out attacks. Many experts now believe that the early stages of
Publish At:2017-06-26 18:30 | Read:1863 | Comments:0 | Tags:Mobile News News cybersecurity news

Virgin Media customers asked to change passwords over hacking alert

800.000 Virgin Media customers advised to change their passwords over imminent hack risk Virgin Media, one of UK’s larger Internet providers, has advised more than their 800.000 customers using a specific router (Super Hub 2), to change their passwords immediately after an investigation revealed they are prone to hacking. The warning comes after ethical secu
Publish At:2017-06-23 16:50 | Read:2510 | Comments:0 | Tags:Mobile News News cybersecurity Hackers news

In India, Personal Data of Millions Exposed by Gov’t Mistake

Around 1 billion citizens registered with a twelve-digit number and recorded in a database with their biometric and personal information. India has scanned the iris and fingerprint of its citizens as part of the Aadhaar initiative, the largest biometric project on the planet, for identification purposes upon accessing social security and other services. Sinc
Publish At:2017-06-23 16:50 | Read:2352 | Comments:0 | Tags:News biometrics india leaks

Skype down due to a DDoS cyberattack

Cyber-crime gang boasts of bringing down Skype on Twitter If you’ve had problems connecting to Skype recently it could well be the result of the latest attack launched by the ‘CyberTeam’ gang. This group of cyber-criminals have been boasting on Twitter, under the hashtag #SkypeDown, of crashing the Microsoft video chat platform. Skype down by CyberTeam Hell
Publish At:2017-06-20 15:10 | Read:2966 | Comments:0 | Tags:Mobile News News cybersecurity DDoS DDOS

Panda Security Warns of a New Phase in Cybertheft

Cybercrime is a very profitable and attractive business. This is a new phase of cyber theft that involves stealing money directly from banks, rather than from their customers, using phishing attacks to infect the computers of bank employees. The million-dollar question is: where are the largest sums of money? They are, without a doubt, in the financial insti
Publish At:2017-06-15 06:15 | Read:3158 | Comments:0 | Tags:News Panda Security adaptive defense bank ciberheists compan


Share high-quality web security related articles with you:)


Tag Cloud