home.social

#insiderthreats — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #insiderthreats, aggregated by home.social.

  1. Peter Williams, former U.S. defense contractor exec, accused of selling trade secrets to Russia for $1.3M. Linked to L3Harris Trenchant, the case underscores insider threats in national security sectors.
    technadu.com/us-former-executi

    #CyberSecurity #InsiderThreats #Espionage #TradeSecrets

  2. Can Your AI Be Hacked by Email Alone?

    No clicks. No downloads. Just one well-crafted email, and your Microsoft 365 Copilot could start leaking sensitive data.

    In this week’s episode of Cyberside Chats, @sherridavidoff and @MDurrin discuss EchoLeak, a zero-click exploit that turns your AI into an unintentional insider threat. They also reveal a real-world case from LMG Security’s pen testing team where prompt injection let attackers extract hidden system prompts and override chatbot behavior in a live environment.

    We’ll also share:

    • How EchoLeak exposes a new class of AI vulnerabilities
    • Prompt injection attacks that fooled real corporate systems
    • Security strategies every organization should adopt now
    • Why AI inputs need to be treated like code

    🎧 Listen to the podcast: chatcyberside.com/e/unmasking-
    🎥 Watch the video: youtu.be/sFP25yH0sf4

    #EchoLeak #Cybersecurity #AIsecurity #Microsoft365 #Copilot #PromptInjection #CISO #InsiderThreats #GenAI #RiskManagement #CybersideChats

  3. This post on Dark Reading discusses the 10 types of AI attacks that CISOs should track. The attacks include adversarial machine learning, deepfakes, and AI-powered spear-phishing. The post also talks about insider threats and vulnerability management in the context of AI attacks. darkreading.com/threat-intelli #AIAttacks #VulnerabilityManagement #InsiderThreats #softcorpremium

  4. This post on Dark Reading discusses the 10 types of AI attacks that CISOs should track. The attacks include adversarial machine learning, deepfakes, and AI-powered spear-phishing. The post also talks about insider threats and vulnerability management in the context of AI attacks. darkreading.com/threat-intelli #AIAttacks #VulnerabilityManagement #InsiderThreats #softcorpremium

  5. This post on Dark Reading discusses the 10 types of AI attacks that CISOs should track. The attacks include adversarial machine learning, deepfakes, and AI-powered spear-phishing. The post also talks about insider threats and vulnerability management in the context of AI attacks. darkreading.com/threat-intelli

  6. This post on Dark Reading discusses the 10 types of AI attacks that CISOs should track. The attacks include adversarial machine learning, deepfakes, and AI-powered spear-phishing. The post also talks about insider threats and vulnerability management in the context of AI attacks. darkreading.com/threat-intelli #AIAttacks #VulnerabilityManagement #InsiderThreats #softcorpremium

  7. Loose and Work In Progress Thoughts Related to #insiderrisk #insiderthreats in the context of #infosec / #cybersecurity / #risk :

    Insider Threats are not solely an effect of remote work, but the advent of remote work compounds them. There is no turning back to in-office only work, so how can organizations protect themselves from Insider Threats in what has become a larger attack surface?

    Collaboration Tools: A fragmented landscape including multiple cloud tools and services including Google Drive, iCloud, Box, Dropbox, and OneDrive. The problem is not the spirit of collaboration or the tools. It’s the approach to managing sensitive data and having visibility of it. Traditional Information security relies on blocking access. While sometimes effective, locked-down employees are not productive employees. Organizations need collaboration tools to stay ahead, and they also need them to maintain employee satisfaction in a highly competitive labor market.

    The nature of work for digital creatives has fundamentally changed. There is no predictable time intervals when all workers are online or supposed to be online. This makes traditional approaches of static behavior matching obsolete. The rise of cloud collaboration technologies expands the risk surface and makes “expected” behavior more ambiguous than ever. Complete visibility into behavior is now needed across platforms but continues to be centered around the behaviors triggered by an endpoint or workstation.

    Traditional Approaches
    - Blocking: This leads to exceptions and is intrusive for a collaborative culture.
    - Static Ringfencing of Data and Digital Assets is no longer Possible
    - Constant re-org
    - Distributed nature
    - Complexity and Dynamism of Required Access Controls
    - Classification: Can’t keep up with the dynamism of an organization. Requires significant up-front effort for initial classification and ongoing overhead to maintain the state.

    If you are directly or tangentially working on these problems would love to connect and learn more from your experiences in the space.

  8. Ars Technicast special edition, part 2: Spotting bad actors inside a company - Enlarge / Artist's impression of an insider threat stealing your stuff. (credit: D-Keine / Getty Im... more: arstechnica.com/?p=1653145 #machinelearning #insiderthreats #specialedition #arstechnicast #technicast #darktrace #podcasts #biz&it #ai