Remove vulnerabilities-threats dealing-with-insider-threats-in-the-age-of-covid
article thumbnail

Come to the dark side: hunting IT professionals on the dark web

SecureList

Key outcomes Our analysis of the dark web job market found: The greatest number of ads were posted in March 2020, which was likely related to the outbreak of the COVID-19 pandemic and the ensuing changes in the structure of the job market. Job ads seeking developers are the most frequent ones, at 61% of the total.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? Mike notes how some basic rules of physical hygiene that can slow the spread of COVID-19 can also map into the digital world. Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? Mike notes how some basic rules of physical hygiene that can slow the spread of COVID-19 can also map into the digital world. Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities.

article thumbnail

How to Stop Local Governments From Being Attractive Cyber Attack Targets

CyberSecurity Insiders

A Steady Drumbeat of Cybersecurity Threats. The amount of data that municipalities deal with has grown exponentially. While often operating on a shoestring budget and with aging infrastructures, local governments tend to rely on their IT team to ensure security rather than a dedicated cybersecurity expert. 1 and June 4.

article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects.

Mobile 352
article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

Over the past year, we have established a comfortable hybrid/remote work environment that is expected to be the norm post-COVID-19. We have seen firsthand that it takes more than an individual task force to combat ransomware and other related threats such as phishing, insider threats and more.