Defining Security Policies to Manage Remote Insider Threats

This is the time to define the new normal; having well-defined policies in place will help businesses maintain its security posture while bolstering the security of the ever-increasing work-from-home population. Continue reading Defining Security Policies to Manage Remote Insider Threats

Secure Authentication of Technical User to a Network-Appliance-HSM

Let’s assume we have an internal environment consisting of some distributed systems, one central system and an internal PKI. The central system is serving a cluster of HSMs that shall be accessable by network in a securely controlled way. … Continue reading Secure Authentication of Technical User to a Network-Appliance-HSM

Someone hijacked Reddit moderator accounts to promote Trump

Hackers appeared to take over a number of influential Reddit accounts Friday to post messages promoting President Donald Trump’s reelection campaign. Some pages were plastered with “Make America Great Again” or “MAGA” logos, while others included messages about the president. The source of the attacks on the subreddit pages appeared to be moderator accounts, a Reddit spokesperson confirmed. “An investigation is underway related to a series of vandalized communities,” the spokesperson said. “It appears the source of the attacks were compromised moderator accounts. We are working to lock down those accounts and restore impacted communities.” Reddit moderators are often unpaid users who volunteer their time to maintain forums and discussions on the popular site. A Reddit post lists the pages that have been affected, including discussion forums dedicated to outer space, the National Football League and “The Avengers.” It was not immediately clear how the moderator accounts had been compromised or who could […]

The post Someone hijacked Reddit moderator accounts to promote Trump appeared first on CyberScoop.

Continue reading Someone hijacked Reddit moderator accounts to promote Trump

US files superseding indictment against former Twitter employees accused of spying for Saudi Arabia

U.S. prosecutors have filed a superseding indictment in federal court against two former Twitter employees for allegedly spying on dissidents on behalf of Saudi Arabia. The Department of Justice had alleged last year that a Saudi national with ties to the royal family had recruited two former Twitter employees, Ahmad Abouammo and Ali Alzabarah, to abuse their access to Twitter to collect sensitive information about Saudi dissidents, including location data, email addresses, and phone numbers. The former Twitter employees allegedly targeted a close associate of American journalist Jamal Khashoggi, who was murdered in 2018 at the behest of Saudi Crown Prince Mohammed bin Salman, according to the CIA. A grand jury has now charged Abouammo, Alzabarah, and Ahmed Almutairi, their alleged intermediary with the Saudi Kingdom, with acting as agents of a foreign government, wire fraud, and money laundering, among other charges. Abouammo is also accused of falsifying records in an effort to obstruct the investigation. Abouammo previously worked as Twitter’s head of […]

The post US files superseding indictment against former Twitter employees accused of spying for Saudi Arabia appeared first on CyberScoop.

Continue reading US files superseding indictment against former Twitter employees accused of spying for Saudi Arabia

#TwitterHack: Power, Privilege and Pandemic

On Wednesday, July 15, the Twitterverse was ablaze with what Twitter itself has described as a “coordinated social engineering attack” that was launched at around 4pm ET. The outcome of this breach was compromised Twitter accounts of many well-known people and organizations, including Jeff Bezos, Elon Musk, Bill Gates, former President Barack Obama, Joe Biden, […]

The post #TwitterHack: Power, Privilege and Pandemic appeared first on Security Intelligence.

Continue reading #TwitterHack: Power, Privilege and Pandemic

The Enemy Within: How Insider Threats Are Changing

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk. Continue reading The Enemy Within: How Insider Threats Are Changing