Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

During mergers and acquisitions, companies should conduct third-party risk assessments to identify insider threats that might be lurking on the network.

The post Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

Every organization is only one click away from a potential compromise

Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for damage, according to the SANS Institute. Looking for an easier target As security protecting organizations from outside attack gets more formidable, attackers look for easier targets – users who already have access to an organization’s most sensitive data, for example, and aren’t as hard to fool as security systems. “While … More Continue reading Every organization is only one click away from a potential compromise

Outsider or Insider: Who Will Cause Today’s Data Breach?

Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.

The post Outsider or Insider: Who Will Cause Today’s Data Breach? appeared first on Security Intelligence.

Continue reading Outsider or Insider: Who Will Cause Today’s Data Breach?

Shadow Brokers grow increasingly aggressive, threaten to dox former U.S. spy

Just 24 hours after a malicious worm infected thousands of computers across Europe, the now infamous Shadow Brokers group published a message celebrating the chaos, advertised a vague new “VIP service” and threatened an unnamed former NSA official for “writing ugly tweets.” In a post on social media publishing site Steemit, the group also hinted at being in possession of FBI hacking tools. Until Wednesday, it was largely believed that only NSA-linked exploits had been published by the group. The Shadow Brokers described a former NSA official “as a doctor living in Hawaii that owns a security company.”  The group threatened to publish this person’s personal information — a practice known as “doxxing” — including their operational history at NSA. The person’s record included missions targeting Chinese nationals, the Shadow Brokers said. “TheShadowBrokers is thinking ‘doctor’ person is former EquationGroup developer who built many tools and hacked organization in China,” the blog […]

The post Shadow Brokers grow increasingly aggressive, threaten to dox former U.S. spy appeared first on Cyberscoop.

Continue reading Shadow Brokers grow increasingly aggressive, threaten to dox former U.S. spy

Shadow Brokers grow increasingly aggressive, threaten to dox former U.S. spy

Just 24 hours after a malicious worm infected thousands of computers across Europe, the now infamous Shadow Brokers group published a message celebrating the chaos, advertised a vague new “VIP service” and threatened an unnamed former NSA official for “writing ugly tweets.” In a post on social media publishing site Steemit, the group also hinted at being in possession of FBI hacking tools. Until Wednesday, it was largely believed that only NSA-linked exploits had been published by the group. The Shadow Brokers described a former NSA official “as a doctor living in Hawaii that owns a security company.”  The group threatened to publish this person’s personal information — a practice known as “doxxing” — including their operational history at NSA. The person’s record included missions targeting Chinese nationals, the Shadow Brokers said. “TheShadowBrokers is thinking ‘doctor’ person is former EquationGroup developer who built many tools and hacked organization in China,” the blog […]

The post Shadow Brokers grow increasingly aggressive, threaten to dox former U.S. spy appeared first on Cyberscoop.

Continue reading Shadow Brokers grow increasingly aggressive, threaten to dox former U.S. spy

The Enemy Within: Identifying Insider Threats in Your Organization

According to recent research, privileged users and administrators represent the biggest insider threats to any organization’s sensitive data.

The post The Enemy Within: Identifying Insider Threats in Your Organization appeared first on Security Intelligence.

Continue reading The Enemy Within: Identifying Insider Threats in Your Organization

Financial Sector Remains a Top Target in 2017

Our prediction at the end of 2016 held true: The influx of advanced DDoS, POS and other attacks targeting the financial sector has yet to abate in 2017.

The post Financial Sector Remains a Top Target in 2017 appeared first on Security Intelligence.

Continue reading Financial Sector Remains a Top Target in 2017

Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016

In manufacturing, security incidents occurred at a rate 40 percent higher than the average across all other industries in 2016, according to X-Force data.

The post Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016 appeared first on Security Intelligence.

Continue reading Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016