article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

What Is a Vulnerability Assessment? Types, Steps & Benefits

eSecurity Planet

Physical security vulnerability assessment: This form of assessment focuses on finding weaknesses in physical security, including perimeter security, access controls, and surveillance systems. Social engineering methods include phishing , baiting, and tailgating. The post What Is a Vulnerability Assessment?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT annual review 2021

SecureList

Based on forensic analysis of numerous mobile devices, Amnesty International’s Security Lab found that the software was repeatedly used in an abusive manner for surveillance. FinSpy is an infamous, commercial surveillance toolset that is used for “legal surveillance” purposes.

Malware 101
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Conduct frequent security audits and penetration testing: Detect and resolve any vulnerabilities before they are exploited by fraudulent actors to minimize the likelihood of data breaches. Assess the physical security measures: Evaluate access controls, surveillance systems, and environmental controls.

Risk 81
article thumbnail

APT trends report Q3 2021

SecureList

On June 3, Check Point published a report about an ongoing surveillance operation targeting a Southeast Asian government, and attributed the malicious activities to a Chinese-speaking threat actor named SharpPanda. It is mainly known for being a proprietary commercial penetration testing toolkit officially designed for red team engagements.

Malware 140