Remove Architecture Remove Passwords Remove Social Engineering Remove Surveillance
article thumbnail

Advanced threat predictions for 2022

SecureList

This year, the use of surveillance software developed by private vendors has come under the spotlight, as discussed above. This includes the use of social engineering to obtain credentials and brute-force attacks on corporate services, in the hope of finding poorly protected servers. And now, we turn our attention to the future.

Mobile 139
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Security infrastructure and redundancy: Check the vendor’s data centers, network architecture, backup and disaster recovery plans, and uptime assurances. Assess the physical security measures: Evaluate access controls, surveillance systems, and environmental controls. Teach them how to verify the sender’s address and URL.

Risk 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Ricardo Villadiego, founder & CEO of Lumu , expects “a significant shift towards adopting models based on passwordless architectures like Google Passkeys as the dominant authentication method to combat phishing and scam campaigns. Joe Payne, President & CEO at Code42 expects biometrics to trigger a shift to insider threats. “As

article thumbnail

APT trends report Q1 2022

SecureList

While we were unable to obtain the same results by analyzing the CERT-UA samples, we subsequently identified a different WhiteBlackCrypt sample matching the WhisperKill architecture and sharing similar code. On February 23, ESET published a tweet announcing new wiper malware targeting Ukraine. Final thoughts.

Malware 137
article thumbnail

APT trends report Q3 2023

SecureList

This strategic shift signals its intent to intensify its surveillance capabilities and expand its range of targets. In its most recent wave of attacks, BlindEagle has once again adapted, embracing yet another open-source RAT, Agent Tesla. The initial attack vector was a phishing email disguised as an email from a government entity or service.