article thumbnail

Zero-Click Attacks a Growing Threat

eSecurity Planet

There is no need for social engineering , as the program can implant backdoors directly without forced consent. Standard approaches such as endpoint protection , aggressive patch management, and zero-trust architectures are effective ways to mitigate zero-click threats. Zero-click attacks remove this hurdle.

Spyware 124
article thumbnail

Advanced threat predictions for 2022

SecureList

This year, the use of surveillance software developed by private vendors has come under the spotlight, as discussed above. This includes the use of social engineering to obtain credentials and brute-force attacks on corporate services, in the hope of finding poorly protected servers. And now, we turn our attention to the future.

Mobile 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will iPhone’s New “Lockdown Mode” Create Dangerous Overconfidence In Apple’s CyberSecurity Capabilities?

Joseph Steinberg

Additionally, keep in mind that while Lockdown Mode may make it more difficult for attackers to exploit social engineering in order to compromise devices, until Apple more strictly controls what apps it allows in its app store , potential government spying remains a major problem. Is that really true?

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Ricardo Villadiego, founder & CEO of Lumu , expects “a significant shift towards adopting models based on passwordless architectures like Google Passkeys as the dominant authentication method to combat phishing and scam campaigns.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Security infrastructure and redundancy: Check the vendor’s data centers, network architecture, backup and disaster recovery plans, and uptime assurances. Assess the physical security measures: Evaluate access controls, surveillance systems, and environmental controls.

Risk 98
article thumbnail

APT trends report Q1 2022

SecureList

While we were unable to obtain the same results by analyzing the CERT-UA samples, we subsequently identified a different WhiteBlackCrypt sample matching the WhisperKill architecture and sharing similar code. On February 23, ESET published a tweet announcing new wiper malware targeting Ukraine. Final thoughts.

Malware 134
article thumbnail

APT trends report Q3 2023

SecureList

This strategic shift signals its intent to intensify its surveillance capabilities and expand its range of targets. In its most recent wave of attacks, BlindEagle has once again adapted, embracing yet another open-source RAT, Agent Tesla.