Remove vulnerabilities-threats insider-threats
article thumbnail

5 Ways Your Company Data Is Still Vulnerable To Insider Threats

CompTIA on Cybersecurity

The consequences of insider threats can be severe, ranging from financial loss to reputational damage. Learn how you can protect your data from these risks.

Risk 61
article thumbnail

Recent DarkGate campaign exploited Microsoft Windows zero-day

Security Affairs

Researchers recently uncovered a DarkGate campaign in mid-January 2024, which exploited Microsoft zero-day vulnerability. is an Internet Shortcut Files Security Feature Bypass Vulnerability. In the campaign observed by ZDI, threat actors used PDF documents lures that contained Google DoubleClick Digital Marketing (DDM) open redirects.

Phishing 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Communication, Cloud & Finance Apps Most Vulnerable to Insider Threat

Dark Reading

Businesses say customer data, financial data, and intellectual property are the types of data most vulnerable to insider attacks.

78
article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

Like any internet voting system, it has inherent security vulnerabilities: if there are malicious insiders, they can corrupt the vote count; and if thousands of voters’ computers are hacked by malware, the malware can change votes as they are transmitted.

Malware 303
article thumbnail

GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures

The Last Watchdog

The vulnerabilities and challenges associated with declining worker mental health is causing cybersecurity risks to increase, especially from insider threats. When an employee is struggling, they may reach a tipping point and become an insider threat. Mental health cyber risks.

article thumbnail

Multiple flaws in pfSense firewall can lead to arbitrary code execution

Security Affairs

Security flaws in Netgate pfSense firewall solution can potentially lead to arbitrary code execution on vulnerable devices. Researchers from SonarCloud discovered several security issues, Cross-Site Scripting (XSS) vulnerabilities and a Command Injection vulnerability in pfSense CE ( CVE-2023-42325 , CVE-2023-42327 , CVE-2023-42326 ).

Firewall 126
article thumbnail

GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

The Last Watchdog

Related: Neutralizing insider threats This pervasive problem extends beyond traditional notions of fraud, encompassing both insider threats and external risks arising from partnerships, competitors, and poor IP management. Organizations must prioritize data and decision intelligence to tackle these threats effectively.

Risk 191