home.social

#insiderthreat — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #insiderthreat, aggregated by home.social.

  1. 📢⚠️ Two US cybersecurity experts have been jailed for aiding the BlackCat ransomware group, extorting victims worldwide, and exploiting insider access for profit.

    Read: hackread.com/us-cybersecurity-

    #CyberSecurity #CyberCrime #ALPHV #BlackCat #Ransomware #InsiderThreat

  2. US Army Employee Indicted for Leaking Classified Defense Information

    A former US Army employee with a top-secret clearance has been indicted for allegedly leaking classified national defense information to unauthorized individuals, raising serious questions about trust and security breaches. This shocking case highlights the urgent need for tighter controls and monitoring of sensitive…

    osintsights.com/us-army-employ

    #NationalSecurity #ClassifiedInformation #InsiderThreat #UsArmy #DefenseSector

  3. 'Is your biggest security threat already inside your castle?' - the definition of an "insider" has fundamentally changed. It’s not just about disgruntled employees; it’s about a complex web of social engineering, digital savviness, and agentic AI. nielharper.com/2026/03/23/is-y #CyberSecurity #InsiderThreat #DigitalTrust #RiskManagement #AI #ZeroTrust #InfoSec

  4. Insider-Bedrohungen: Das Risiko, das wir uns nicht länger leisten können zu unterschätzen. Während Unternehmen Millionen in den Schutz vor externen Angriffen investieren, entsteht ein Großteil der gefährlichsten Vorfälle dort, wo es niemand erwartet: im eigenen Haus. Aktuelle Untersuchungen zeigen: Insider-Bedrohungen gehören inzwischen zu den kostspieligsten und am schwierigsten zu erkennenden Vorfällen. #InsiderThreat #CyberSecurity #IdentitySecurity #Cybercrime

  5. CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters

    Sergiu Gatlan reports:

    American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters threat actors.

    However, the company noted that its systems were not breached as a result of this incident and that customers' data was not compromised.

    "We identified and terminated a suspicious insider last month following an internal investigation that determined he shared pictures of his computer screen externally," a CrowdStrike spokesperson told BleepingComputer today.

    Read more at Bleeping Computer: bleepingcomputer.com/news/secu

    #insiderthreat #crowdstrike #scatteredlapsus$hunters

  6. Your security is only as strong as your people's will to keep it.

    Educate.
    Endorse.
    Or eliminate.

    Stay silent. Stay secure.

    #CyberSecurity #HumanFactor #SecurityAwareness #InsiderThreat #RiskManagement

  7. Alleged Geisinger hacker will defend himself pro se.

    What's that old adage about someone defending themself instead of using a lawyer? That they have a fool for a client?

    I've uploaded two of his filings -- the motion to defend pro se, which was granted, and now an emergency motion to be temporarily released from prison because... well, he gives some reasons. You'll see.

    databreaches.net/2025/06/18/al

    And fwiw, Nuance never responded to my inquiries at the time of his arrest asking about what kind of background check they had done because his history revealed a number of past run-ins with the law.

    #databreach #healthsec #businessassociate #HIPAA #insiderthreat #idtheft #fraud

  8. York County, Pennsylvania incident:

    An employee of a vendor that had been hired to develop software for York County Civil Courts was provided “with certain York County Civil Courts data to use for software development and testing purposes. The employee subsequently left the vendor’s employment without returning this data,” according to the county's press release.

    So it seems they gave the vendor's employee REAL data to use for development and testing -- with "contact information, Social Security numbers, driver’s license or state ID card numbers, financial and medical information"

    And of course, there's no evidence of misuse, but they have referred the matter to law enforcement.....

    h/t, pennlive.com/news/2025/05/cent

    #infosecurity #govsec #insiderthreat

  9. Today's reminder of the #insiderthreat

    Some great reporting by Jason Leopold about how an insider incident at govt contractor #Opexus was the root of a massive federal #databreach

    Original source: news.bloomberglaw.com/tech-and

    Nonpaywalled source: insurancejournal.com/news/nati

    DataBreaches.net had reported on the Akhter twins' arrest and conviction for an earlier insider breach back in 2015. Link to past coverage of them: databreaches.net/?s=akhter

  10. Today's reminder of the insider threat involves a pharmacist in Maryland who over a period of 8 years or more, used keyloggers and installed spyware on about 400 computers at the University of Maryland Medical System so he could spy on female co-workers in private moments at work (such as changing clothes, breastfeeding their babies), and in their homes. He was reportedly fired in October 2024, and was able to get another job in another healthcare facility in Maryland because there has been no criminal charges filed against him yet and UMMS apparently didn't alert his new employer.

    If Maryland law is like my state's laws, the hospital may be barred legally from revealing what happened if asked for a recommendation by the new employer. And it seems the Maryland state pharmacy board can't just suspend a license unless there's been a conviction, so the failure to have criminal charges filed already seems to have put more potential victims at risk.

    Unsurprisingly, a potential class action lawsuit has already been filed against UMMS with six plaintiffs so far. There are estimates that there are more than 80 victims of the now-former employee.

    Some of the media coverage on the case: thedailyrecord.com/2025/04/04/

    #InsiderThreat #keylogger #workplace #privacy #infosec

  11. The North Koreans and Russians have been busy, Insiders abound, and attacker tradecraft continues to evolve!

    Catch all this and more in our latest wrap-up of the day's news:

    🗞️ opalsec.io/daily-news-update-m

    There are a few noteworthy stories to get across - here's the TL;DR to get you up to speed:

    🕵️ North Korean Infiltration: This is way bigger than many think. DPRK nationals are landing jobs inside global companies, gaining privileged access ("keys to the kingdom" level!). DTEX reports active investigations in 7% of their Fortune Global 2000 clients, and CrowdStrike notes nearly 40% of their NK-related IR cases involved insiders. They move fast post-hire, pivoting to supply chains and installing RATs disguised as onboarding. Watch out for highly anomalous login behaviour (like days-long sessions!). Rigorous remote hiring checks (camera on, resume checks, comms style) are crucial.

    🎣 ClickFix Tactics by Lazarus: The infamous North Korean group is evolving its 'Contagious Interview' campaign (now dubbed 'ClickFake' by Sekoia). They're targeting crypto job seekers (shifting focus to non-tech roles too!) with fake website/document errors ('ClickFix'). These prompt users to run PowerShell/curl commands, dropping the 'GolangGhost' backdoor. Watch out for lures impersonating giants like Coinbase or Kraken. Sekoia has shared YARA rules – definitely worth checking out.

    💻 WordPress MU-Plugin Abuse: Bad actors are getting stealthy by hiding malicious code in WordPress "Must-Use Plugins" (wp-content/mu-plugins/). These execute automatically on every page load without activation, making them hard to spot. Sucuri is seeing redirects to fake browser updates, webshell backdoors fetching code from GitHub, and JS hijackers replacing content or links. Keep those instances patched, clean up unused plugins/themes, and lock down admin accounts (MFA!).

    Check out what else happened in the past 24 hours, and subscribe to get each edition straight to your inbox:
    📨 opalsec.io/daily-news-update-m

    #CyberSecurity #InfoSec #ThreatIntelligence #Hacking #DataBreach #Phishing #Malware #WordPress #NorthKorea #Russia #Ukraine #AI #SecurityCopilot #GRUB2 #Bootloaders #InsiderThreat #DataProtection #CyberAttack #infosecurity #cybersecuritynews #ClickFix

  12. CW: uspol eupol

    Ich hoffe inständig, daß sich die europäischen Mitgliedsstaaten der #NATO damit befassen, wie man mit dem US-amerikanischen NATO-Oberbefehl (siehe #SACEUR General Cavoli) in Europa unter einem Commander-in-Chief Trump als #InsiderThreat umgeht, und entsprechende Vorbereitungen treffen.

    Ich würde mir eine #ETO als Rückfallposition zu einer ggf. US-sabotierten NATO wünschen. Nach heute wäre ich nicht mehr überrascht, wenn die USA Russland Zugang zu NATO-Internas gewähren.

  13. CW: uspol eupol

    Ich hoffe inständig, daß sich die europäischen Mitgliedsstaaten der #NATO damit befassen, wie man mit dem US-amerikanischen NATO-Oberbefehl (siehe #SACEUR General Cavoli) in Europa unter einem Commander-in-Chief Trump als #InsiderThreat umgeht, und entsprechende Vorbereitungen treffen.

    Ich würde mir eine #ETO als Rückfallposition zu einer ggf. US-sabotierten NATO wünschen. Nach heute wäre ich nicht mehr überrascht, wenn die USA Russland Zugang zu NATO-Internas gewähren.

  14. CW: uspol eupol

    Ich hoffe inständig, daß sich die europäischen Mitgliedsstaaten der #NATO damit befassen, wie man mit dem US-amerikanischen NATO-Oberbefehl (siehe #SACEUR General Cavoli) in Europa unter einem Commander-in-Chief Trump als #InsiderThreat umgeht, und entsprechende Vorbereitungen treffen.

    Ich würde mir eine #ETO als Rückfallposition zu einer ggf. US-sabotierten NATO wünschen. Nach heute wäre ich nicht mehr überrascht, wenn die USA Russland Zugang zu NATO-Internas gewähren.