home.aspx


 
.

The DigiTrust Group


The DigiTrust Group is a leading global provider of offensive cyber security consulting and defensive managed services with a focus on continuous incident response. We provide seamlessly integrated incident management, monitoring and response to strengthen our client organizations' defense against cyber security breaches. Our elite Security Operations Center teams actively hunt and eject threat actors targeting our client organizations using cutting-edge proprietary technology and processes. Our offensive teams specialize in advanced adversarial emulation using authentic adversary tactics and techniques to validate the strength of clients' security through the perspective of a real-world threat actor.

RELATED NEWS


The hacker group calling itself Shadow Brokers continues to release tools and exploits allegedly stolen from the U.S. National Security Agency (NSA), including a sophisticated espionage platform that can be used to take full control of targeted computers....
SECURITY WEEK
READ MORE

Do you believe that just because you have downloaded an app from the official app store, you're safe from malware? Think twice before believing it. A team of security researchers from several security firms have uncovered a new, widespread botnet that consists of tens of thousands of hacked Android smartphones. Dubbed WireX, detected as "Android Clicker," the botnet network primarily includes infected Android devices running one of the hundreds of malicious apps installed from Goog...
THE HACKER NEWS
READ MORE

Although the wave of WannaCry and Petya ransomware has now been slowed down, money-motivated hackers and cyber criminals have taken lessons from the global outbreaks to make their malware more powerful. Security researchers have now discovered at least one group of cyber criminals that are attempting to give its banking Trojan the self-spreading worm-like capabilities that made recent ransomware attacks go worldwide. The new version of credential stealing TrickBot banking Trojan, known as "...
THE HACKER NEWS
READ MORE

Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect. Security researchers have discovered that one of the most dangerous Android banking Trojan families has now been modified to add a keylogger to its recent strain, giving attackers yet another way to steal victims sensitive data. Kaspersky Lab's Senior malware analyst Rom...
THE HACKER NEWS
READ MORE

Today, election hacking is not just about hacking voting machines, rather it now also includes hacking and leaking dirty secrets of the targeted political parties—and there won’t be a perfect example than the last year's US presidential election. But, in countries like America, even hacking electronic voting machines is possible—that too, in a matter of minutes. Several hackers reportedly managed to hack into multiple United States voting machines in a relatively short peri...
THE HACKER NEWS
READ MORE

Drone hackers in the UK are busy at work exploiting the application security shortcomings of a major manufacturer to circumvent restrictions, including flight elevation limits. DJI says it has pushed out a firmware update to nip the problem in the bud, but one expert The Register spoke to maintains that hacking is still possible. The potential for drone hacking can be traced back to a mistake made by DJI in leaving development debug code in its Assistant 2 application. Changes could be made by c...
THE REGISTER
READ MORE

Russian attempts to hack key American election systems are more advanced than first thought, according to Homeland Security officials on Wednesday. In a public hearing into election hacking held by the US Senate Intelligence Committee, the Department of Homeland Security's acting director of the cyber division, Dr Samuel Liles, claimed that the electoral systems of 21 as-yet-unnamed states were tested by hackers from the Russian government in October last year....
THE REGISTER
READ MORE

University College London is tonight tackling a serious ransomware outbreak that has scrambled academics' files. It is feared the software nasty may be exploiting a zero-day vulnerability, or is a previously unseen strain of malware as antivirus defenses did not spot it in time, we're told. Eggheads at the UK uni are urged to not open any more email attachments, which may be booby-trapped with the ransomware....
THE REGISTER
READ MORE

Network security has improved little over the last 12 months – millions of vulnerable devices are still exposed on the open internet, leaving them defenceless to the next big malware attack. A follow-up audit by Rapid7 – the firm behind the Metasploit pen-testing tool – found that more than a million endpoints were confirmed as exposing Microsoft file sharing services (Server Message Block, TCP port 445). The majority (800,000) of these systems were on Windows, leaving a target...
THE REGISTER
READ MORE

Last December, a cyber attack on Ukrainian Electric power grid caused the power outage in the northern part of Kiev — the country's capital — and surrounding areas, causing a blackout for tens of thousands of citizens for an hour and fifteen minutes around midnight. Now, security researchers have discovered the culprit behind those cyber attacks on the Ukrainian industrial control systems....
THE HACKER NEWS
READ MORE

EVENTS

No Upcoming Events For The DigiTrust Group
No Past Events For The DigiTrust Group