Remove insider-threats ignore-the-insider-threat-at-your-peril
article thumbnail

Ignore the Insider Threat at Your Peril

Dark Reading

Attacks from insiders often go undiscovered for months or years, so the potential impact can be huge. These 11 countermeasures can mitigate the damage.

90
article thumbnail

On Trust and Transparency in Detection

Anton on Security

When we detect threats we expect to know what we are detecting. But as we increasingly move towards more elaborate detection approaches like detection-as-code using languages like the Sigma language , or Python, it is becoming more difficult to deduce in detail how certain threat detections work. Sounds painfully obvious, right?

article thumbnail

FBI shuts down malware on hundreds of Exchange servers, opens Pandora’s box

Malwarebytes

They allow attackers to access and creep around inside the compromised networks. Some organisations missed or ignored the mass-massaging about the threat. We’ll get to that but before we do, let’s talk about the perils of getting involved in situations. Bizarrely, they did this without letting the admins know beforehand.

Malware 101