Prison for former sysadmin who hacked industrial facility and caused a million dollars worth of damage

Are you a sysadmin who left your last job under a cloud?
My advice is don’t try and seek revenge by hacking into the company that fired you. You might end up with a lengthy prison sentence.
Read more in my article on the Hot for Security blog.
Continue reading Prison for former sysadmin who hacked industrial facility and caused a million dollars worth of damage

Insider threat vs. inside threat: Redefining the term

The traditional meaning of an insider threat is when a current employee or contractor with authorized access to a secure network intentionally or accidently misuses it to carry out a malicious activity. This type of activity can include sabotage, theft, espionage, fraud, mishandling of data or physical devices, as well as using information to gain a competitive advantage. An infamous example of this was in 2008 when a city employee changed administrative passwords to gain … More Continue reading Insider threat vs. inside threat: Redefining the term

Insider threat solution for rapid response to in-progress attacks

CyberArk announced at RSA Conference 2017 advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution, to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress attacks. With this release, CyberArk is delivering a new integration that provides deeper insights into privileged activity across an organization. A new data feed from CyberArk Privileged Session Manager into CyberArk Privileged Threat Analytics, both part of the … More Continue reading Insider threat solution for rapid response to in-progress attacks

For the Love of SIEM

Not feeling the love from your SIEM solution? Integrate it with existing tools to best fit the unique needs and goals of your business.

The post For the Love of SIEM appeared first on Security Intelligence.

Continue reading For the Love of SIEM

Did Your Developer Leave a Website Backdoor?

A Dutch developer stole e-commerce customers’ login credentials using a website backdoor and admin access that former employers had neglected to revoke.

The post Did Your Developer Leave a Website Backdoor? appeared first on Security Intelligence.

Continue reading Did Your Developer Leave a Website Backdoor?

Former NSA contractor indicted for stealing massive trove of classified documents

A federal grand jury returned an indictment Wednesday accusing former defense contractor Harold T. Martin III of stealing classified and top secret government documents. Government lawyers say that from 1996 to August 2016, Martin repetitively stole information pertaining to NSA, U.S. Cyber Command, CIA and National Reconnaissance Office operations and capabilities Martin allegedly stored much of this […]

The post Former NSA contractor indicted for stealing massive trove of classified documents appeared first on Cyberscoop.

Continue reading Former NSA contractor indicted for stealing massive trove of classified documents

Hackers Offering Money to Company Insiders in Return for Confidential Data

The insider threat is the worst nightmare for a company, as the employees can access company’s most sensitive data without having to circumvent security measures designed to keep out external threats.

The rogue employee can collect, leak, or sell all … Continue reading Hackers Offering Money to Company Insiders in Return for Confidential Data

IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

A new report based on IBM MSS data revealed that ransomware, insider threats and third-party breaches plagued health care organizations in 2016.

The post IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches appeared first on Security Intelligence.

Continue reading IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

A new report based on IBM MSS data revealed that ransomware, insider threats and third-party breaches plagued health care organizations in 2016.

The post IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches appeared first on Security Intelligence.

Continue reading IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime

User behavior analytics solutions can help security operations teams analyze users’ habits for anomalies that might expose a threat.

The post Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime appeared first on Security Intelligence.

Continue reading Creatures of Habit Give Security Operations Teams the Upper Hand in Fighting Cybercrime