Remove Document Remove Security Defenses Remove Surveillance
article thumbnail

APT trends report Q1 2021

SecureList

It was first publicly documented in 2014, in the aftermath of the Gamma Group hacking incident. On February 24, the National Security Defense Council of Ukraine (NSDC) publicly warned that a threat actor had exploited a national documents circulation system (SEI EB) to distribute malicious documents to Ukrainian public authorities.

Malware 145
article thumbnail

Vulnerability Recap 7/8/24 – Intel, Cisco & More Face Risks

eSecurity Planet

July 3, 2024 Threat Actors Exploit MSHTML Flaw to Deploy MerkSpy Surveillance Tool Type of vulnerability: Remote code execution. The problem: A Microsoft MSHTML vulnerability, CVE-2021-40444 , was exploited to distribute the MerkSpy surveillance program. Ghostscript is widely used for document processing.

Risk 62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Security Fundamentals: Understanding the Basics

eSecurity Planet

Document the findings: Keep track of the discovered assets, their classification, and the rationale for priority. Implement Security Controls Following NIST’s cloud security model, develop policies, methods, and technology for protecting cloud assets, such as access control, encryption, and network security.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Evaluate the network architecture: Determine whether the SaaS provider uses network segmentation to separate client data and apps from one another, reducing the risk of unauthorized access and lateral movement in the event of a security breach. Gather feedback from all stakeholders, including IT, security, and business departments.

Risk 105
article thumbnail

Keeper vs Dashlane: Which Should You Use in 2024?

eSecurity Planet

Dashlane uses thorough breach scanning to provide password health scores, security alerts, and dark web monitoring. It employs security features like 256-bit AES encryption and 2FA, with master passwords encrypted using PBKDF2. Their password health checker and real-time dark web surveillance also improve overall security.

article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

By using the provider’s knowledge and resources, enterprises may have access to best practices and sophisticated security features without needing in-house security expertise. Automated Security Updates & Patching The underlying hardware and software infrastructure is managed and maintained by IaaS providers.

article thumbnail

What Is Cloud Data Security? Definition, Benefits & Best Practices

eSecurity Planet

Increased attack surface: Flexible and scalable cloud infrastructures frequently result in misconfigurations and assets placed outside of security policies. By adhering to these best practices, you can build a strong cloud data security architecture that secures sensitive information.