HackDig : Dig high-quality web security articles for hacker

Threat Intelligence: A Tear-Free Solution to Help SOC Analysts Prepare for the Next WannaCry

It’s been nearly six months since the WannaCry ransomware stole global headlines and thousands of security practitioners flocked to threat intelligence feeds to help streamline their investigations. While the security community has learned many valuable lessons from the attack, it’s impossible to say that a strike of this magnitude won’t ha
Publish At:2017-10-26 01:10 | Read:4058 | Comments:0 | Tags:Malware Security Intelligence & Analytics Threat Intelligenc

What Do Recent Attacks Mean for OT Network Security?

Security management can be proactive or reactive depending on each organization’s risk appetite. When attacks are made public, things change, and learning from threats becomes a requirement for both C-suite members and security leaders. WannaCry, NotPetya and Industroyer are some of the most recently analyzed malware pieces. Apart from corporate networ
Publish At:2017-09-27 22:46 | Read:3391 | Comments:0 | Tags:Endpoint Energy & Utility Incident Response Network Critical

Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks

Endpoint attacks can come from any direction and many sources. Just consider the reported vulnerabilities found in Apache Struts and the damage caused by WannaCry and Petya. Companies need to stay one step ahead of endpoint attacks, but they struggle due to a lack of visibility of endpoint status, the complexity of investigations and ineffective remediation.
Publish At:2017-09-25 15:30 | Read:4372 | Comments:0 | Tags:Endpoint Incident Response Apache Endpoint Management Endpoi

Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

The IBM X-Force Vulnerability Database (XFDB), which holds over 100,000 publicly disclosed vulnerabilities, is chock-full of insights concerning the cybersecurity threat landscape. Much of the data is publicly available directly on the IBM X-Force Exchange platform and can be accessed by users anytime. In reviewing the database on an ongoing basis, the IBM
Publish At:2017-09-14 21:10 | Read:4747 | Comments:0 | Tags:Advanced Threats Endpoint Threat Intelligence X-Force Resear

What Do Avocados and Threat Intelligence Have in Common?

Full disclosure: I would not eat guacamole for years because a certain puppet-centric movie I saw as a child had me convinced that it was actually made of frog brains. Once in college, however, seeing guacamole being made completely changed my opinion — unlike a sausage-making demonstration in a rather unfortunate public speaking class that same year of coll
Publish At:2017-09-13 08:20 | Read:2526 | Comments:0 | Tags:Incident Response Threat Intelligence IBM X-Force Exchange I

Who Is Marcus Hutchins?

In early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in the security community until May 2017 when the U.K. media revealed him as the
Publish At:2017-09-09 13:55 | Read:4044 | Comments:0 | Tags:Other atthackers@hotmail.com Blackhole bv1 co

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Over the past few months, we have seen widespread attacks such as NotPetya and WannaCry cripple organizations at record scale and speed, either for monetary gain or with the sole purpose of causing destruction. In their wake, many professionals are assessing what these new threats mean for their security strategies, infrastructures and policies. As a point o
Publish At:2017-09-07 15:10 | Read:2468 | Comments:0 | Tags:Identity & Access Authentication Human Factor Identity and A

Blindfolded on the Battlefield: The Importance of Threat Hunting in the Modern Age

One of the fundamental problems with cybersecurity is that organizations often do not realize when they are compromised. Traditional incident response methods are typically reactive, forcing security teams to wait for a visible sign of an attack. The problem is that many attacks today are stealthy, targeted and data-focused. Just stop for a moment to ask you
Publish At:2017-08-23 22:25 | Read:2244 | Comments:0 | Tags:Data Protection Risk Management Data Breach Threat Detection

Incident Response and Threat Intelligence: A Potent One-Two Punch to Fight Cybercrime

Cybercriminals and their tactics are becoming increasingly sophisticated. Given the rash of widespread, devastating attacks thus far in 2017, this trend shows no signs of slowing down. It’s no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with
Publish At:2017-08-17 19:00 | Read:2074 | Comments:0 | Tags:Incident Response Security Services Threat Intelligence Adva

Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

As both a parent and a bit of a nerd, I have a lot of corny jokes in my arsenal that cover a wide range of topics including animals, food, science fiction and the like. One of my favorite jokes comes from my data science background: “I never metadata I didn’t like.” This joke has it all: wordplay, the spirit of a joke your uncle might tell
Publish At:2017-08-16 09:00 | Read:2986 | Comments:0 | Tags:Threat Intelligence X-Force Research IBM X-Force Exchange IB

Threat Hunting Services Are Now a Basic Necessity

For the past few years, the security industry has seen a gradual move away from traditional, resource-heavy endpoint protection agents to next-generation solutions in response to the increasing sophistication of malware, cybercriminal tactics and the threat landscape at large. Traditional host intrusion detection systems (HIDS) built on signature-based det
Publish At:2017-08-07 21:55 | Read:3321 | Comments:0 | Tags:Endpoint Security Intelligence & Analytics Security Services

WannaCry, The Aftermath: How WannaCry Could Have Been WannaSmile

I have been working in the field of cyber security and related areas for over 20 years. In that time there have been many cyber incidents. Those that instantly spring to mind include the ‘I Love You’ virus, the OpenSSL security vulnerability ‘HeartBleed’, and the viral worm ‘Nimbda’. All of them are consumer level awareness incidents that became, if no
Publish At:2017-08-07 21:30 | Read:2579 | Comments:0 | Tags:General Security healthcare security ransomware WannaCry

Does History Need to Repeat Itself? Lessons Learned From WannaCry

Often, at the end of a project, especially a long and complicated one, there will be a ‘lessons learned’ session held. These sessions usually bring together either the internal team or consortia teams, to discuss what went wrong and what went right with the project.The discussions are a way of analyzing events. If done well, they can give future projec
Publish At:2017-08-04 19:45 | Read:2500 | Comments:0 | Tags:Healthcare Information Security healthcare security ransomwa

New WannaCry-Mimicking SLocker Abuses QQ Services

by Lorin Wu Trend Micro researchers detected a new SLocker variant that mimics the GUI of the WannaCry crypto-ransomware on the Android platform. Detected as ANDROIDOS_SLOCKER.OPSCB, this new SLocker mobile ransomware variant features new routines that utilize features of the Chinese social network QQ, along with persistent screen-locking capabilities. SLock
Publish At:2017-08-02 20:00 | Read:3453 | Comments:0 | Tags:Mobile Ransomware mobile ransomware SLocker WannaCry

Lloyd’s of London: A massive cyber attack could cause an average of $53 billion of economic losses

A major global cyber attack has the potential to trigger $53 billion of economic losses, the equivalent to a natural disaster like 2012’s Superstorm Sandy. Events like the massive Wannacry attack or the Ukraine power outage raise the discussion about the possible economic losses caused by a cyber attack. According to a new report published by the Lloyd’
Publish At:2017-07-22 11:15 | Read:2596 | Comments:0 | Tags:Breaking News Hacking cost of cyber attack insurrance Lloyds


Share high-quality web security related articles with you:)


Tag Cloud