Remove category
Remove Document Remove Examples Remove Information Security Remove Manufacturing Remove Security
article thumbnail

Experts link Hermit spyware to Italian surveillance firm RCS Lab and a front company

Security Affairs

The malware samples analyzed impersonated the applications of telecommunications companies or smartphone manufacturers. According to leaked documents published in WikiLeaks in 2015, RCS Lab was a reseller of the notorious Italian surveillance firm HackingTeam. However, we found various publicly-available clues that suggest otherwise.

article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

How to use this template: Comments intended to guide understanding and use of this template will be enclosed in brackets “[…]” and the ‘company’ will be listed as [eSecurity Planet] throughout the document. Overview Security vulnerabilities enable attackers to compromise a resource or data.

Risk 107
article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

Insider threats are one of the most difficult security challenges that organisations face. A malicious threat can be an employee, contractor or business partner who is liable to leak sensitive information. A malicious threat can be an employee, contractor or business partner who is liable to leak sensitive information.