Remove industry-news rogue-employee-insider-threat
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

While Teslas aren’t the typical business IoT device, their connection to the internet makes them a cyber threat as much as your business’s other IoT technology. Imagine a corporate office where only two employees drive Teslas. Only people whose IDs have been added to the system can make it inside.

Hacking 125
article thumbnail

Ransomware, supply chain attacks compel health care organizations to act

SC Magazine

In the wake of the SolarWinds incident, an increasing number of health care institutions are embarking on threat-hunting missions to seek and destroy exploitable vulnerabilities. Featuring a compilation of interviews, outside research and recent news stories, the report offers key recommendations for various stakeholders.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

We can see that the number of threat actors that rely on client-side attacks (JavaScript) is diminishing by the day. Advanced threat actors from countries placed under economic sanctions may rely more on ransomware imitating cybercriminal activity. Threat actors conducted a series of attacks using the Cring ransomware.

article thumbnail

GUEST ESSAY: Here?s why Tesla has been sabotaged twice in two years ? lax network security

The Last Watchdog

The disclosure earlier this week that Tesla CEO Elon Musk reportedly informed all of his employees about a rogue worker conducting “extensive and damaging sabotage” to the company’s operations very much deserves the news coverage it has gotten. Related: The ‘golden age’ of cyber spying is upon us. Fast forward to this week.

article thumbnail

The Biggest Lessons about Vulnerabilities at RSAC 2021

eSecurity Planet

Deploy file integrity monitoring and threat hunt regularly. Sadly, advancements in cybersecurity extend to malicious actors as much as they do to industry professionals. The result is a wealth of adversaries capable of evading detection and networks unprepared for a zero-day threat. Excessive Access by Tokens.

Software 119
article thumbnail

Advanced threat predictions for 2023

SecureList

While the geopolitical landscape has durably shifted, cyberattacks remain a constant threat and show no signs of receding – quite the contrary. Although 2022 did not feature any mobile intrusion story on the scale of the Pegasus scandal, a number of 0-days have still been exploited in the wild by threat actors. Source: Meta.

Firmware 116