Get Pricing Start Free Trial

Insider Threat Blog

Posted on Friday, July 10, 2015 by Oliver Levin
Adam Schefter is ESPN’s star child.  As the networks most popular reporter, Schefter has broken countless stories over the years, almost always pertaining to the NFL.  His “sources” always have inside information, breaking news and are almost always anonymous. However, the anonymity of one of his most recent sources could be in jeopardy after Schefter tweeted out a picture of Jason Pierre-Paul’s medical records.  Jason Pierre-Paul (JPP) is a star defensive lineman for the New York Giants. ... Continue Reading →
Posted on Wednesday, June 24, 2015 by Dimitri Vlachos
Companies and their employees are becoming increasingly dependent upon applications to achieve business objectives and increase productivity. However, the proliferation of applications is creating a serious security risk. This is because identifying users’ risky behavior and non-compliance with policies can be nearly impossible especially considering that typical organization now collects and stores a vast amount of customer data. In addition, the large number of employees accessing... Continue Reading →
Posted on Friday, June 19, 2015 by David Mai
Ever since the Houston Astros defeated the St. Louis Cardinals in the 2005 NLCS, their rivalry has been relatively dormant.  However, shocking news from the FBI would seem to conclude that this rivalry is not only still alive, but criminal! The St. Louis Cardinals front office staff is under investigation by the F.B.I. and Justice Department prosecutors for allegedly hacking into the internal network of the Houston Astros in order to steal information and player data.  This is the first time... Continue Reading →
Kaspersky Logo
Posted on Thursday, June 11, 2015 by Micky Oland
Kaspersky is an internet security company that is used to being in the news for detecting cyber attacks for its clients such as when they revealed the $1 billiion hack heist that affected 100 banks (mostly located in Russia).  However, Kaspersky is now in the news for being the target of a Nation State hack. A Nation State attack is one that is sponsored by a country and employs the most sophisticated breed of hackers.   A Sophisticated Attack Kaspersky Lab believes the attack was executed to... Continue Reading →
Posted on Wednesday, June 10, 2015 by Daniel Petri
In Unix, commands are used to execute specific tasks in IT functions such as development, maintenance, and production. Many of these commands are needed for businesses to operate and play key roles in each department or business unit. There are hundreds of commands and most of them are used for day to day operations and are innocuous, but some are very powerful and if used corruptly or maliciously to destroy a system, can cause millions of dollars in losses. Due to their very nature, commands... Continue Reading →
Japan Pension Fund Insider Threat
Posted on Thursday, June 4, 2015 by Matt Zanderigo
Japan's National Pension Breach On May 28, 2015, an attack on Japan’s national pension system compromised the sensitive information of approximately 1.25 million people including names, pension identification numbers, addresses and birth dates. The breach resulted from a malicious link in an external e-mail that contained a virus that infected Japan’s Pension Service staff computers. This attack and the recent IRS data breach illustrate that government IT systems are increasingly being targeted... Continue Reading →
Posted on Tuesday, June 2, 2015 by David Mai
Last week, the Internal Revenue Service (IRS) suffered a data breach affecting 104,000 U.S. households.  Cyber criminals used a tool on the IRS website to obtain prior year tax-return information.  The cyber criminals gained access to the agency’s online Get Transcript service using previously stolen Social Security numbers and other personal data. By accessing the transcripts of previously filed tax returns, these cyber criminals had access to loads of data.  While a normal data breach... Continue Reading →
Posted on Monday, May 25, 2015 by Gaby Friedlander
In a privilege escalation attack, the attackers can elevate their privileges, by granting themselves authorizations that are usually reserved for higher-access users. In most privilege escalation attacks, the hackers first logs in with a low-end user account and then searches for exploitable programming errors or design flaws in the system that can be used to escalate their privileges. If the hackers successfully exploit such vulnerabilities, they may be able to create new system users, access... Continue Reading →
Posted on Monday, May 18, 2015 by Michael Gordover
A breach that recently made the headlines, the UMass Memorial Medical Center breach, may have started 12 years ago. It's a perfect example of how hard it can be to detect inappropriate access to patient records. On April 9th, the UMass Memorial Medical Center, learned that a now former employee stole patient information such as names, date of births, addresses, and Social Security numbers from the hospital’s billing application. The former medical center worker was employed at the facility... Continue Reading →
Posted on Wednesday, May 13, 2015 by Gaby Friedlander
KuppingerCole is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). Their analysts are experienced in extracting value from collecting and maintaining information security for corporations across mobile, cloud, and social platforms. In a recent Report, KuppingerCole gives an executive view of ObserveIT’s User Activity Monitoring solution. Below is a brief summary of the report. Privileged Management: Privileged Management... Continue Reading →

Pages

Try it Now
Contact Us