Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

News & Commentary
Accidental Insider Leaks Prove Major Source of Risk
Dark Reading Staff, Quick Hits
Research reports highlight growing concerns around insider negligence that leads to data breaches.
By Dark Reading Staff , 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Let's Stop Blaming Employees for Our Data Breaches
Chrysa Freeman, Manager of Security Awareness, Code42Commentary
Assuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity.
By Chrysa Freeman Manager of Security Awareness, Code42, 5/27/2021
Comment1 Comment  |  Read  |  Post a Comment
Orange: Your Leaky Security is Coming from Inside the House!
Terry Sweeney, Contributing EditorCommentary
SPONSORED: Your home WiFi router may be screaming fast, but it's also a major point of vulnerability in this work-from-home era, says Charl van der Walt, head of security research at Orange Cyberdefense. And while Zero Trust offers some relief, he offers up some how-to advice to ensure it's properly deployed.
By Terry Sweeney Contributing Editor, 5/26/2021
Comment0 comments  |  Read  |  Post a Comment
The Adversary Within: Preventing Disaster From Insider Threats
Kevin Dunne, President, PathlockCommentary
Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.
By Kevin Dunne President, Pathlock, 5/25/2021
Comment0 comments  |  Read  |  Post a Comment
Former FBI Employee Indicted for Taking Documents Home
Dark Reading Staff, Quick Hits
The long-time intelligence analyst was accused of inappropriately handling documents related to national security.
By Dark Reading Staff , 5/24/2021
Comment0 comments  |  Read  |  Post a Comment
Security Providers Describe New Solutions (& Growing Threats) at RSAC
Terry Sweeney, Contributing EditorCommentary
SPONSORED CONTENT: Watch now -- Leading security companies meet Dark Reading in the RSA Conference Broadcast Alley to talk about tackling insider threat, SOC complexity, cyber resilience, mobile security, attacker evasion, supply chain threats, ransomware, and more.
By Terry Sweeney Contributing Editor, 5/20/2021
Comment1 Comment  |  Read  |  Post a Comment
Why Anti-Phishing Training Isn't Enough
Aviv Grafi, CEO & Founder, VotiroCommentary
Not only is relying on employees' awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems.
By Aviv Grafi CEO & Founder, Votiro, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Insider Data Leaks: A Growing Enterprise Threat
Dark Reading Staff, Quick Hits
Report finds 85% of employees are more likely to leak sensitive files now than before the COVID-19 pandemic.
By Dark Reading Staff , 4/23/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Greetings, Earthlings
John Klossner, CartoonistCommentary
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 4/22/2021
Comment17 comments  |  Read  |  Post a Comment
How to Attack Yourself Better in 2021
Pavel Suprunyuk, Technical lead of the audit and consulting team, Group-IBCommentary
Social engineering pen testing is just one step in preventing employees from falling victim to cybercriminals.
By Pavel Suprunyuk Technical lead of the audit and consulting team, Group-IB, 4/21/2021
Comment0 comments  |  Read  |  Post a Comment
Software Developer Arrested in Computer Sabotage Case
Dark Reading Staff, Quick Hits
Officials say Davis Lu placed malicious code on servers in a denial-of-service attack on his employer.
By Dark Reading Staff , 4/15/2021
Comment0 comments  |  Read  |  Post a Comment
US Tech Dominance Rides on Securing Intellectual Property
Joe Payne, President and CEO at Code42Commentary
A recent, mostly overlooked pardon points to a big problem in the US tech industry: Intellectual property offers a lucrative golden ticket for insiders.
By Joe Payne President and CEO at Code42, 4/2/2021
Comment0 comments  |  Read  |  Post a Comment
Enterprises Remain Riddled With Overprivileged Users -- and Attackers Know It
Robert Lemos, Contributing WriterNews
Attackers commonly focus on finding users with too much privileged access as their ticket to network compromise. What can companies do?
By Robert Lemos Contributing Writer, 4/1/2021
Comment1 Comment  |  Read  |  Post a Comment
Russian Man Pleads Guilty in Thwarted Tesla Hack
Dark Reading Staff, Quick Hits
Egor Kriuchkov will be sentenced in May on conspiracy charge
By Dark Reading Staff , 3/19/2021
Comment0 comments  |  Read  |  Post a Comment
Zero Trust in the Real World
Jerry W. Chapman, engineering fellow at Optiv SecurityCommentary
Those who are committed to adopting the concept have the opportunity to make a larger business case for it across the organization, working with executive leaders to implement a zero-trust framework across the entire enterprise.
By Jerry W. Chapman engineering fellow at Optiv Security, 2/10/2021
Comment0 comments  |  Read  |  Post a Comment
Multivector Attacks Demand Security Controls at the Messaging Level
Otavio Freire, CTO & President, SafeGuard CyberCommentary
As a Google-identified attack reveals, security teams need to look beyond VPNs and network infrastructure to the channels where social engineering takes place.
By Otavio Freire CTO & President, SafeGuard Cyber, 2/10/2021
Comment0 comments  |  Read  |  Post a Comment
How Neurodiversity Can Strengthen Cybersecurity Defense
Liviu Arsene, Global Cybersecurity Researcher at BitdefenderCommentary
Team members from different backgrounds, genders, ethnicities, and neurological abilities are best equipped to tackle today's security challenges.
By Liviu Arsene Global Cybersecurity Researcher at Bitdefender, 2/9/2021
Comment0 comments  |  Read  |  Post a Comment
Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
Mark Wojtasiak, VP, Portfolio Marketing, Code42Commentary
It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks.
By Mark Wojtasiak VP, Portfolio Marketing, Code42, 1/12/2021
Comment0 comments  |  Read  |  Post a Comment
Reducing the Risk of Third-Party SaaS Apps to Your Organization
Dmitry Dontov, Chief Technology Officer, Spin TechnologyCommentary
Such apps may try to leak your data, or can contain malicious code. And even legitimate apps may be poorly written, creating security risks.
By Dmitry Dontov Chief Technology Officer, Spin Technology, 12/29/2020
Comment0 comments  |  Read  |  Post a Comment
Defending the COVID-19 Vaccine Supply Chain
Nick Rossmann, Global Threat Intelligence Lead, IBM Security X-ForceCommentary
We must treat this supply chain like a piece of our nation's critical infrastructure, just like the electrical grid or air traffic control system.
By Nick Rossmann Global Threat Intelligence Lead, IBM Security X-Force, 12/28/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-23
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
PUBLISHED: 2021-06-23
Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in Security Advisor report management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in file sharing management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
PUBLISHED: 2021-06-23
Exposure of sensitive information to an unauthorized actor vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to obtain sensitive information via unspecified vectors.