HackDig : Dig high-quality web security articles for hackers

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

Every website on the Internet is somewhat vulnerable to security attacks. The threats range from human errors to sophisticated attacks by coordinated cyber criminals.According to the Data Breach Investigations Report by Verizon, the primary motivation for cyber attackers is financial. Whether you run an eCommerce project or a simple small business website, t
Publish At:2020-12-21 03:02 | Read:327 | Comments:0 | Tags:Cyber Security Featured Articles threat web application atta

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end of this year, up from $USD 227.8 billion just a year ago. Clearly, cloud computing is making its way to cloud nine, (See what I did there?) leveraging the sweet fruits of being in the spotlight for a decade. However, the threats to public
Publish At:2020-11-26 02:26 | Read:400 | Comments:0 | Tags:Cloud Featured Articles cloud security compliance data prote

Joint Cybersecurity Advisory on Threat Hunting and Incident Response Released

A joint cybersecurity advisory released on September 1st detailed technical methods for uncovering and responding to malicious activity including best practice mitigations and common missteps. A collaborative effort, this advisory (coded AA20-245A) is the product of research from the cybersecurity organizations of five nations. Those include the United State
Publish At:2020-09-15 01:50 | Read:615 | Comments:0 | Tags:Cyber Security advisory incident response threat security cy

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intell
Publish At:2017-07-17 06:40 | Read:4775 | Comments:0 | Tags:Innovation breach breachless detection disposable Forensics

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:6169 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

WannaCry Ransomware Racing Around the World, Wreaking Havoc

This is a special rapid response blog to breaking news about the WannaCry ransomware attack that is now being seen in more than 100 countries. We’ll be updating our blog with additional news as we learn more.  “No x-rays/bloods/bleeps/phones/notes. This is unprecedented. It will be a miracle if no-one comes to harm.” This dramatic tweet from an Nationa
Publish At:2017-05-13 12:35 | Read:4284 | Comments:0 | Tags:Breaking News Threats breach breaking news endpoint microsof

Zero-Day Vulnerability is a Zero-Sum Game

Late last week a new Microsoft Office vulnerability was discovered by McAfee; they discovered attacks exploiting this vulnerability back to late January 2017. This should raise substantial concern for anyone responsible for cyber security at their company or federal agency. Since January, every Windows-based MS Office machine was exposed to the worst type o
Publish At:2017-04-16 13:05 | Read:3873 | Comments:0 | Tags:Breaking News Government Threats Malware McAfee Microsoft Of

Bromium, the Stuff Super Heroes Use

For any of you who were at one time in your youth a Super Hero, technology today might be a little reminiscent of that time. Unlike those childhood games, however, this is no game at all. In the world of technology the enemy engages us with weapons like phishing and malware. What is this new super-powered defense? It is called Bromium, not just protection b
Publish At:2017-04-16 13:05 | Read:3812 | Comments:0 | Tags:End Users end user Endpoint Protection Security threat

Breaking News: “It’s a Very Large-Scale Espionage Operation”

A complex cybercrime spy ring has been revealed today. A China-based cyber gang is behind the effort. Countries targeted include Japan, UK, France and the United States. If you’re responsible for your company’s cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story
Publish At:2017-04-05 08:55 | Read:6723 | Comments:0 | Tags:Breaking News Threats browsing China click crime email Malwa

The Top 13 Information Security Conferences of 2017

2017 is finally here. You know what that means: another information security conference season is upon us. We couldn’t be more excited!Just like we did last year, we at The State of Security have assembled a list of the top 13 conferences in information security for 2017. We hope you’ll have the chance to attend at least one of these events this
Publish At:2017-01-11 12:55 | Read:6489 | Comments:0 | Tags:Off Topic Conferences CTF hacking Information Security pente

Festive Phishing in the Workplace

It’s that most wonderful time of the year again – for cyber-criminals and all manner of online miscreants, that is. Whilst next-gen malware samples may be finding new and inventive ways of delivering their payloads, the tried and tested phishing scam isn’t going anywhere just yet. Especially during this distracting and emotive season when even the most vigil
Publish At:2016-12-13 17:55 | Read:6168 | Comments:0 | Tags:Featured Articles IT Security and Data Protection data mitig

AtomBombing, a new threat to your Windows

A few days ago Tal Liberman, a security researcher from the company enSilo revealed a new code injection technique that affects all Windows versions up to Windows 10. Due to the nature of this technique it is unlikely that it can be patched. In this article I’d like to shed light on this attack, its consequences and what can be done in order to protect ours
Publish At:2016-11-04 13:35 | Read:4635 | Comments:0 | Tags:Malware Mobile News atombombing companies highlighted Panda

Be careful with CryptoBit, the latest threat detected

A few days ago at PandaLabs, Panda Security’s anti-malware lab, we discovered a type of ransomware that we believe is extremely important to talk about, especially because of its novelty and its unique features. The name of this new ransomware is CryptoBit. If we compare it to what we’ve learned thus far from other ransomware, we can say that CryptoBit is a
Publish At:2016-04-20 23:10 | Read:5190 | Comments:0 | Tags:Malware Panda Security cryptobit news Ransomware threat

Ponmocup – A giant hiding in the shadows

Ponmocup, first discovered in 2006 as Vundo or Virtumonde, is one of the most successful botnets of the past decade, in terms of spread and persistence. The reasons why this botnet is considered highly interesting are that it is sophisticated, underestimated and is currently largest in size and aimed at financial gain. This underestimated botnet is still in
Publish At:2015-12-13 12:05 | Read:5733 | Comments:0 | Tags:Blog botnet milicenso pirminay ponmocup report threat virtum

Threat Recap: Week of Dec 7th

Top 5 Week of Dec. 7 UAE Bank Hack In the last week, a major financial institution in the United Arab Emirates was hacked, with customer information being ransomed for a sum of nearly $3 million USD. The bank’s refusal to pay the significant ransom lead to the hacker releasing account information of nearly 500 customers, via Twitter. Although the Twitt
Publish At:2015-12-11 20:30 | Read:7597 | Comments:0 | Tags:Malware Threat Research Breach SecurityNews threat


Tag Cloud