HackDig : Dig high-quality web security articles

What is killware?

Killware is a type of malware that is being deployed with the sole intention of causing physical harm, even death. Cyber psychopaths deploying such malicious code have one goal – to case pure real-life destruction. Killware is a relatively new term that has been heavily mentioned in the media over the last couple of weeks. Experts believe that killware might
Publish At:2021-10-21 10:00 | Read:203 | Comments:0 | Tags:Mobile News News Security killware security threats

The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have

The more things change, the more they stay the same. Despite a changing threat landscape and threat actors who keep upping their game, the vulnerabilities behind the threats remain consistent. The OWASP Top 10, ranked by the Open Web Application Security Project, lists the 10 most prominent and dangerous risks and threats for applications. The OWASP top 10
Publish At:2021-09-01 16:33 | Read:334 | Comments:0 | Tags:Software Vulnerabilities Application Security CISO Security

‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue

At best, a new cybersecurity alert should trigger immediate action. But we all know in practice that work is not always clear cut. A new alert can find itself as just the latest un-addressed number in the inbox. In an inbox-zero case, the latest new alert is the most urgent task. But in a backed-up, bottleneck situation, it may be treated as the least urgen
Publish At:2021-04-20 10:31 | Read:783 | Comments:0 | Tags:Security Intelligence & Analytics Incident Response Security

Lock and Code S1Ep1: On RSA, the human element, and the week in security

Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good on our promise, with lots of headlines generated right here on Labs, as well as other security news around the web. In addition, we talk with Britta Glade, Director of Content and Curation for RSA Conference, about the theme for last week’s con
Publish At:2020-03-02 14:50 | Read:1994 | Comments:0 | Tags:Podcast lock and code malware podcast scams security threats

Cyber insurance: here to stay, whether we like it or not

Cyber insurance has been a big talking point in infosec circles for many months now. We’ve mentioned it in passing ourselves a few times, usually in relation to ransomware attacks. This isn’t surprising; ransomware may not be the threat that brought cyber insurance to life, but it absolutely helped to supercharge it. Depending on where in the world you resid
Publish At:2019-10-10 11:20 | Read:2786 | Comments:0 | Tags:Ransomware backups claims cyber insurance cybersecurity poli

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model using few
Publish At:2017-10-30 17:15 | Read:6823 | Comments:0 | Tags:Threats case study data sheet defenses detection endpoint mo

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How m
Publish At:2017-10-21 16:25 | Read:6253 | Comments:0 | Tags:Threats access points application attack vector endpoint End

Cybersecurity Doesn’t Just Happen, You Have to Get a Round Tuit (We Have One For You)

It’s Monday. On the West Coast, Black Hat is over and if you traveled, you should be home. If you didn’t travel, it’s still Monday and there are things to be done. And August starts tomorrow – so you might be thinking, “Bah, let’s get through August and then I’ll refocus.” Not so fast. This is a round tuit. Y
Publish At:2017-07-31 14:15 | Read:8107 | Comments:0 | Tags:Threats bbc breaches data priorities research round tuit Sec

When All Else Fails in Cybersecurity, Application Isolation Does Not

We hear about cybersecurity fails all the time. We’re happy to tell you it doesn’t have to be that way. Application isolation and containment based on virtualization is delivering results. The NSA has called out this strategy as the way forward for stopping advanced threats. To many technology folks, Application Isolation may be a new term when
Publish At:2017-07-26 12:05 | Read:6200 | Comments:0 | Tags:Threats application isolation control demo government Isolat

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:7029 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Our Bring Your Own Malware Challenge is Back!

We are hosting the Bring Your Own Malware Challenge at a series of upcoming events. Bring it to InfoSec in London, Gartner Security Summit in Maryland and of course, Black Hat in July. The rules are simple, you have to plan ahead, but we have a cash prize. That’s right. We’ll be hosting our BYOM aka Bring Your Own Malware Challenge once again, and it will
Publish At:2017-05-25 01:00 | Read:7317 | Comments:0 | Tags:Company News Threats challenge endpoint infosec Isolation Ma

Fresh Phish. (So Many Puns, So Little Time.)

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig
Publish At:2017-05-23 12:10 | Read:6109 | Comments:0 | Tags:Threats apps attachments browsing files humans Isolation Mal

Why Virtualization Rocks; Stopping Nation-State, Polymorphic Malware (video)

The WannaCry ransomware attack was a call to arms. We actually were lucky; it could have been a lot worse. Employees need to open attachments; you need to stop worrying about that. In the shadow of WannaCry, we hosted a live webcast with our co-founder, Ian Pratt and team members, Robert Wiggenhorn and Simon Plant, to answer questions about the ransomware
Publish At:2017-05-16 14:15 | Read:5412 | Comments:0 | Tags:Threats

Security Professionals Admit to Paying Ransom and Hiding Breaches (Infographic)

We did a survey at RSAC in February that kind of blew our minds; so much so we surveyed more people to check our work! Security professionals admit to paying ransom (from ransomware) and not telling anyone what they’d done. When we went more broadly – U.S. and U.K. security pros – the numbers didn’t get better (they got worse). Have
Publish At:2017-05-13 12:35 | Read:6730 | Comments:0 | Tags:Company News Threats breaches infographic Malware ransom Ran

WannaCry Ransomware Racing Around the World, Wreaking Havoc

This is a special rapid response blog to breaking news about the WannaCry ransomware attack that is now being seen in more than 100 countries. We’ll be updating our blog with additional news as we learn more.  “No x-rays/bloods/bleeps/phones/notes. This is unprecedented. It will be a miracle if no-one comes to harm.” This dramatic tweet from an Nationa
Publish At:2017-05-13 12:35 | Read:5096 | Comments:0 | Tags:Breaking News Threats breach breaking news endpoint microsof


Share high-quality web security related articles with you:)
Tell me why you support me <3