article thumbnail

Towards native security defenses for the web ecosystem

Google Security

In this post we share how our Information Security Engineering team is deploying Trusted Types , Content Security Policy , Fetch Metadata Request Headers and the Cross-Origin Opener Policy across Google to help guide and inspire other developers to similarly adopt these features to protect their applications.

article thumbnail

New steganography attack targets Azerbaijan

Malwarebytes

Threat actors often vary their techniques to thwart security defenses and increase the efficiency of their attacks. Based on the decoy document, we assess that this attack is targeting the government and military of Azerbaijan. The malicious document contains a macro that is obfuscated. Maldoc analysis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Patch Tuesday Includes Word, Streaming Service Zero-Days

eSecurity Planet

Natalie Silva, lead cyber security engineer at Immersive Labs, told eSecurity Planet that the Word vulnerability in particular poses a high risk, noting that the Preview Pane is a potential attack vector. ” Exploiting the vulnerability could lead to the disclosure of Net-NTLMv2 hashes, she added.

article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a thorough procedure that requires your IT and security teams to look closely at your firewall documentation and change management processes. Your team may want to use a specific software to track the list of objectives and steps, or you may just use a Google or Word document and share it with relevant stakeholders.

Firewall 105
article thumbnail

Experts link the Black Basta ransomware operation to FIN7 cybercrime gang

Security Affairs

The Sentinel Labs’s analysis revealed that Black Basta ransomware operators develop and maintain their own toolkit, they documented only collaboration with a limited and trusted set of affiliates. It focused on deploying POS malware and launching targeted spear-phishing attacks against organizations worldwide. bat WindowsILUg69ql2.bat

article thumbnail

How Steganography Allows Attackers to Evade Detection

eSecurity Planet

Steganography, derived from Greek words meaning “covered” and “writing,” has been used for centuries to hide secret messages inside regular documents. It does not raise curiosity, and most security tools do not flag such file types. In 2020, a campaign relying on steganographic documents affected companies in the U.K.,

article thumbnail

Protecting more with Site Isolation

Google Security

and Alex Moshchuk, Chrome Security Team Chrome's Site Isolation is an essential security defense that makes it harder for malicious web sites to steal data from other web sites. Posted by Charlie Reis? Additionally, Chrome will now trigger Site Isolation based on the new Cross-Origin-Opener-Policy (COOP) response header.