Triple Threat: Insecure Economy, Cybercrime Recruitment and Insider Threats

A wave of layoffs, coupled with increased recruitment efforts by cybercriminals, could create the perfect conditions for insider threats to flourish
The post Triple Threat: Insecure Economy, Cybercrime Recruitment and Insider Threats appeared first on … Continue reading Triple Threat: Insecure Economy, Cybercrime Recruitment and Insider Threats

Six years prison for ex-Ubiquiti staffer who stole data and attempted to extort millions of dollars

es, you should be worried about the threat posed by external hackers. But also consider the internal threat posed by insiders and rogue employees – the people you have entrusted to act responsibly with the data of your company and your customers.

R… Continue reading Six years prison for ex-Ubiquiti staffer who stole data and attempted to extort millions of dollars

Organizations brace for cyber attacks despite improved preparedness

Cyber-risk levels have improved from “elevated” to “moderate” for the first time, but insiders represent a persistent threat for global organizations, according to Trend Micro. Jon Clay, VP of threat intelligence at Trend Micro:… Continue reading Organizations brace for cyber attacks despite improved preparedness

The costly threat that many businesses fail to address

Insider attacks such as fraud, sabotage, and data theft plague 71% of U.S. businesses, according to Capterra. These schemes can cost companies hundreds of thousands of dollars and the vast majority of businesses (79%) say they take longer to uncover th… Continue reading The costly threat that many businesses fail to address

How companies are struggling to build and run effective cybersecurity programs

A recent Code42 report reveals a rapidly growing number of inside risk incidents and a concerning lack of training and technology, further exacerbated by increasing workforce turnover and cloud adoption. In this Help Net Security video, Joe Payne, Pres… Continue reading How companies are struggling to build and run effective cybersecurity programs

Ex-Ubiquiti worker pleads guilty to data theft, extortion, and smear plot

A former software engineer at Ubiquiti Networks has pleaded guilty to stealing gigabytes of data from the firm, attempting to extort millions of dollars, and damaging the company’s reputation in the media.

Read more in my article on the Hot for Secu… Continue reading Ex-Ubiquiti worker pleads guilty to data theft, extortion, and smear plot

The next cyber threat may come from within

71% of business executives worry about accidental internal staff error as one of the top threats facing their companies, almost on par with concern about outside attackers (75%), according to EisnerAmper. An additional 23% said they worry about malicio… Continue reading The next cyber threat may come from within

Insider attacks becoming more frequent, more difficult to detect

Insider threats are a top concern at organizations of all kinds; only 3% of respondents surveyed are not concerned with insider risk, according to Gurucul. With responses from more than 325 cybersecurity professionals, the report explores the latest tr… Continue reading Insider attacks becoming more frequent, more difficult to detect

Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks. As the number of threats and the financial impact of breaches increase, these frameworks are even more crucial. Consider ransomware. Since 2020, more than 130 different strains of these encryption and extortion efforts have […]

The post Now You SIEM, Now You Don’t —Six Failures of Cybersecurity appeared first on Security Intelligence.

Continue reading Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever the motivation, compromised enterprise systems are the ultimate results. In th… Continue reading Insights into insider threats: Detecting and monitoring abnormal user activity