Remove Document Remove Education Remove Examples Remove Security
article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Microsoft Office Documents.

Libraries 103
article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

Documents leaked from Russian IT contractor NTC Vulkan show it was likely involved in the development of offensive tools. The documents demonstrate that it also developed hacking tools for the Russia-linked APT group Sandworm. The documents include details for three projects named Scan, Amesit, and Krystal-2B.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. GDPR (among other legal requirements in the EU and elsewhere) can expose multinational organizations to hefty financial penalties, additional rules for disclosing data breaches, and increased scrutiny of the adequacy of their data security.

article thumbnail

Streamlining Document Approvals for Better Project Management

OneHub

Project managers are the unsung superheroes of the professional world, but document approvals are their kryptonite. So, how do you get a document approved on time without harassing your client? Create a secure, standardized system for document approvals. Business files are too valuable to risk a security breach.

article thumbnail

Top 5 Cloud security challenges, risks and threats

IT Governance

But as is often the case with technological solutions, the benefits of convenience comes with security risks. In this blog, we look at the top five Cloud security challenges that organisations face, and provide tips on how to overcome them. Data breaches. The website is simply designed to look like the real thing.

Cloud 133
article thumbnail

“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud

Security Affairs

Security researcher Salvatore Lombardo shared details about a new instance of Nigerian fraud that he called ‘Beyond the border scam.’ Here is an example of the new Nigerian scam to which I have given the name ” Beyond the border scam ” and which is carried out entirely online and via email. Source: www.computersecuritynews.it/beyond-the-border-scam-attenzione-allistanza-della-nuova-truffa-alla-nigeriana

article thumbnail

Google researchers found multiple security issues in Intel TDX

Security Affairs

Google Cloud Security and Project Zero researchers found multiple vulnerabilities in the Intel Trust Domain Extensions (TDX). Google Cloud Security and Project Zero researchers, working with Intel experts, discovered multiple vulnerabilities in the Intel Trust Domain Extensions (TDX). ” reads the report released by Google.