article thumbnail

Iran-linked MERCURY APT behind destructive attacks on hybrid environments

Security Affairs

Both groups used MULLVAD VPN. The attackers were able to interfere with security tools using Group Policy Objects (GPO). Once bypassed the security defenses, the attackers deployed the ransomware payload in the NETLOGON shares on several domain controllers. DEV-1084 used Rport and a customized version of Ligolo.

article thumbnail

What Is an Application Level Gateway? How ALGs Work

eSecurity Planet

Educating users on ALG usage might be difficult, perhaps outweighing the benefits of deployment. The underutilization or misconfiguration of these tools reduces the intended security and performance benefits offered by ALGs. User Training Challenges Large enterprises may need user training for implementing ALGs.

Firewall 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

Regular Security Audits: Security audits using vulnerability scans or penetration tests should be conducted regularly to detect vulnerabilities and verify that security rules are properly implemented and followed.

article thumbnail

Strong Encryption Explained: 6 Encryption Best Practices

eSecurity Planet

For example, Microsoft recommends using disk encryption to encrypt data at rest, separate database encryption, and encrypted VPN gateways for data transmission. Secure & Centralize Key Management Use encryption experts and centralize encryption key management for improved security.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Virtual private networks (VPNs): Secure remote user or branch office access to network resources through encrypted connections to firewalls or server applications. Virtual desktop infrastructure (VDI): Replaces VPN or remote desktop access with virtual desktops in fully controlled environments with additional protections.

article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

The algorithm allows for variable key sizes and variable rounds to increase randomness and security. AES encryption can be commonly found in communication protocols, virtual private network (VPN) encryption, full-disk encryption, and Wi-Fi transmission protocols. It was updated by Chad Kime on December 7, 2023.

article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

Secure remote connection services can be provided by MSSPs through implementation and management of older technology such as a virtual private network (VPN) or through solutions such as virtual desktop interfaces (VDIs), desktop-as-a-service (DaaS), and browser isolation.