Insider Threats
WordPress Supply Chain Attack—93 Add-Ons Infected for Months
A popular maker of WordPress plugins and themes was hacked—93 of AccessPress’s offerings were modified to give the hackers “full access” to users’ sites ...
Teachable Moment: An Insider Threat on Your Team
No manager or executive wants to receive a phone call informing them that a team member has engaged in suspicious activities that require a security investigation. But that’s just what happened to ...
Crypto.com: Fortune Favors the Hacker—$16M ‘Stolen’
DeFi exchange Crypto.com got hacked yesterday, sources say. Users reported imaginary money missing from their accounts—as researchers watched it get laundered ...
Don’t Let the Great Resignation Become an Insider Threat
The Great Resignation has had a major impact on cybersecurity in multiple ways, including increasing the risk of insider threats. In a profession that already suffers from a talent gap, many organizations ...
‘Russian’ Wiper Malware: ‘Prelude to war’ in Ukraine
Ukraine is again under malware attack. And the tactics look strikingly similar to 2017’s NotPetya hack by the Russian GRU ...
1/6/21 Insurrection—What Did the Social Networks Know?
The January 6 committee has had enough of delay and prevarication. It’s written yet again to four social network CEOs, telling them in no uncertain terms to get a move on. Oh, ...
Cybersecurity in 2022: Addressing Insider Threats
As companies grapple with pandemic-induced economic uncertainty, operational disruption and business transformation, cybersecurity has increasingly coalesced with these priorities. Several high-profile cybersecurity incidents drove news cycles in 2021, prompting leaders to reassess ...
This is the Year to Create a Cybersecurity Culture
Many of the cybersecurity predictions for 2022 are, well, predictable. Ransomware will continue to wreak havoc across different industries. Watch for attacks against critical infrastructure. Deep fakes will be used to spread ...
Securing Onboarding and Offboarding in the Cloud
One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, ...
Why Insider Threat Risk Increases in the Cloud
As organizations move to the cloud, enterprise data is increasingly created, used and stored across a variety of SaaS and cloud-based service providers. While these services bring new efficiencies and, in some ...