The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Insider Threats
Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace
No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.
June 01, 2023
No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.
by Elizabeth Montalbano, Contributor, Dark Reading
June 01, 2023
5 MIN READ
Article
Pentagon Leaks Emphasize the Need for a Trusted Workforce
Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.
May 30, 2023
Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.
by Kellie Roessler, Insider Risk Advocate & Author, DTEX Insider Intelligence & Investigations (i3) Team
May 30, 2023
4 MIN READ
Article
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
May 26, 2023
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
by Dark Reading Staff, Dark Reading
May 26, 2023
1 MIN READ
Article
Major US CFPB Data Breach Caused by Employee
The sensitivity of the personal information involved in the breach has yet to be determined by agency officials, but it affects 256,000 consumers.
April 20, 2023
The sensitivity of the personal information involved in the breach has yet to be determined by agency officials, but it affects 256,000 consumers.
by Dark Reading Staff, Dark Reading
April 20, 2023
2 MIN READ
Article
'Zaraza' Bot Targets Google Chrome to Extract Login Credentials
The data-stealing malware threatens the cyber safety of individual and organizational privacy by infecting a range of Web browsers.
April 18, 2023
The data-stealing malware threatens the cyber safety of individual and organizational privacy by infecting a range of Web browsers.
by Dark Reading Staff, Dark Reading
April 18, 2023
1 MIN READ
Article
Beyond CVEs: The Key to Mitigating High-Risk Security Exposures
Use ongoing exposure management to parse the riskiest exposures and probable attack paths, then identify and plug the choke points.
April 18, 2023
Use ongoing exposure management to parse the riskiest exposures and probable attack paths, then identify and plug the choke points.
by Shay Siksik, VP, Customer Experience, XM Cyber
April 18, 2023
4 MIN READ
Article
Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare
Indicators point to Twitter's source code being publicly available for around three months, offering a developer security object lesson for businesses.
March 27, 2023
Indicators point to Twitter's source code being publicly available for around three months, offering a developer security object lesson for businesses.
by Nate Nelson, Contributing Writer, Dark Reading
March 27, 2023
3 MIN READ
Article
7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media
How to stay safe, even when tech-savvy admins can't tell the difference between a scam and the truth.
February 22, 2023
How to stay safe, even when tech-savvy admins can't tell the difference between a scam and the truth.
by Anna Larkina, Web Content Analysis Expert, Kaspersky
February 22, 2023
4 MIN READ
Article
Israel's Top Tech University Targeted by DarkBit Ransomware
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.
February 21, 2023
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.
by Nathan Eddy, Contributing Writer, Dark Reading
February 21, 2023
4 MIN READ
Article
Insider Threats Don't Mean Insiders Are Threatening
By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
February 21, 2023
By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
by Szilveszter Szebeni, Co-Founder & CISO, Tresorit
February 21, 2023
5 MIN READ
Article
The Threat from Within: 71% of Business Leaders Surveyed Think Next Cybersecurity Breach Will Come from the Inside
January 30, 2023
January 30, 2023
3 MIN READ
Article
Hunting Insider Threats on the Dark Web
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
January 23, 2023
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
by Jim Simpson, Director of Threat Intelligence, Searchlight Cyber
January 23, 2023
4 MIN READ
Article
Cybersecurity and the Myth of Quiet Quitting
People are working harder than ever, but they're not happy about it — and the insider threat is all too real.
January 18, 2023
People are working harder than ever, but they're not happy about it — and the insider threat is all too real.
by Lynsey Wolf, Global i3 Investigations Team Lead, DTEX
January 18, 2023
4 MIN READ
Article
Are Meta and Twitter Ushering in a New Age of Insider Threats?
The era of digital trust is broken, and constant vigilance is needed to get things back on track.
January 03, 2023
The era of digital trust is broken, and constant vigilance is needed to get things back on track.
by Ian McShane, Vice President of Strategy, Arctic Wolf
January 03, 2023
4 MIN READ
Article
Popular WAFs Subverted by JSON Bypass
Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.
December 12, 2022
Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.
by Robert Lemos, Contributing Writer, Dark Reading
December 12, 2022
3 MIN READ
Article