article thumbnail

Russia-linked APT28 targets govt bodies with fake NATO training docs

Security Affairs

Russia-linked cyberespionage group APT28 uses fake NATO training documents as bait in attacks aimed at government bodies. The malicious code was distributed using fake NATO training materials as bait and had a very low detection rate of 3/61 on VirusTotal. The researchers analyzed files (Course 5 – 16 October 2020.zipx)

Military 107
article thumbnail

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

Their trepidation is focused on the potential undermining of a core security component of classical computing systems: encryption. The monumental challenge is that replacing classical encryption with PQC will be complicated and time consuming. To its credit, the global cybersecurity community is not asleep on this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

Sample data classification from Proofpoint’s dashboard Train Employees on Their Roles in Data Security To initiate employee data security training, first examine the organization’s particular risk landscape and regulatory requirements. Encrypt data at rest with encryption algorithms and secure storage techniques.

article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

This can include: Anti-malware technology; Information security policies; Access controls; Staff awareness training; Data protection impact assessments; Key cards to enter the office; and Locks for cabinets containing sensitive information. Any digital records must be protected appropriately, such as with access controls or data encryption.

article thumbnail

What is Cyber Extortion and How Can It Be Prevented?

IT Governance

The malicious software encrypts victims’ systems and forces them to pay money in return for the safe return of the data. Ransomware is a type of cyber attack in which criminal hackers plant malicious code on the victim’s systems, which cripples services and encrypts files. Then came the rise in ransomware.

IT 130
article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training and testing), it’s important to make sure that the time and investment are well spent. A wide variety of training options are available.

article thumbnail

Expert Insight: Leon Teale

IT Governance

Actually, it’ll be at its most secure if it’s set to use AES (Advanced Encryption Standard) encryption instead of the weaker Blowfish encryption. However, it’s much better than PPTP and, because it can be configured to use AES encryption, arguably more trustworthy than L2TP/IPsec.