#insider-threat

[ follow ]
#data-breach
fromDataBreaches.Net
2 weeks ago
Information security

South Korea blames Coupang data breach on management failure, not sophisticated attack - DataBreaches.Net

Privacy professionals
fromDatabreaches
8 months ago

North Shore University Sleep Disorders Center employee charged with secretly recording patients in restrooms

Breach involved insider wrongdoing with unauthorized surveillance of patients at a healthcare facility.
Former employee charged after using a hidden camera to record individuals without consent.
Privacy professionals
fromDataBreaches.Net
1 day ago

Evoke Wellness at Hilliard updates its breach notification - DataBreaches.Net

An Ohio addiction treatment center discovered unauthorized patient data access by a former employee in October 2024, but delayed notifying affected individuals until August 2025, with inconsistent breach discovery dates in official notifications.
fromDataBreaches.Net
2 weeks ago
Information security

South Korea blames Coupang data breach on management failure, not sophisticated attack - DataBreaches.Net

Privacy professionals
fromDatabreaches
8 months ago

North Shore University Sleep Disorders Center employee charged with secretly recording patients in restrooms

Breach involved insider wrongdoing with unauthorized surveillance of patients at a healthcare facility.
Former employee charged after using a hidden camera to record individuals without consent.
Information security
fromTechzine Global
6 days ago

70 percent of organizations see AI as the biggest data risk

70% of companies view AI as the most significant data security risk, with AI systems gaining trusted insider access to corporate data often with less control than human users.
fromThe Hacker News
1 week ago

Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

"As part of the alleged scheme to commit trade secret theft, the defendants used their employment to obtain access to confidential and sensitive information," the DoJ said in a press release. "The defendants then exfiltrated confidential and sensitive documents, including trade secrets related to processor security and cryptography and other technologies, from Google and other technology companies to unauthorized third-party and personal locations, including to work devices associated with each other's employers, and to Iran."
Tech industry
fromTheregister
2 weeks ago

Infosec exec sold eight zero-day exploit kits to Russia: DoJ

That changed last week when the US Department of Justice published a sentencing memorandum [PDF] that frames Williams' conduct as a betrayal of his employer and the US government, and the cause of significant harm to US national security. Williams "made it possible for the Russian Broker to arm its clients with powerful cyber exploits that could be used against any manner of victim, civilian or military around the world," the DoJ said.
Information security
E-Commerce
fromsfist.com
2 weeks ago

Two Bay Area Men Among Five Sentenced to Prison For Scheme to Steal $2.5M From DoorDash

A group exploited DoorDash backend access to create fake driver and customer accounts, stealing over $2.5 million through fabricated high-value orders.
#ransomware
fromIT Pro
3 months ago
Information security

When cyber professionals go rogue: A former 'ransomware negotiator' has been charged amid claims they attacked and extorted businesses

fromIT Pro
3 months ago
Information security

When cyber professionals go rogue: A former 'ransomware negotiator' has been charged amid claims they attacked and extorted businesses

US news
fromDataBreaches.Net
1 month ago

Ex-Google Engineer Guilty of Stealing AI Tech for Chinese Firm - DataBreaches.Net

A Google engineer was convicted of stealing AI chip documents and committing economic espionage to build a competing startup in China.
fromSecuritymagazine
1 month ago

What Background Checks Miss: The Human Layer Behind Modern Screening

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.
Information security
Information security
fromSecuritymagazine
1 month ago

The Email Insider Threat Has Evolved in the Era of Generative AI

Insider threats—both malicious code operating inside endpoints and AI-enabled social engineering via email—pose the most critical, evolving risk to enterprise email security by 2026.
Information security
fromInfoWorld
1 month ago

Google Vertex AI security permissions could amplify insider threats

Unmonitored service-agent identities and platform components can allow elevated, undetected access; treat service agents as privileged and monitor their activity to detect abuse.
#espionage
Information security
fromTechzine Global
2 months ago

Security experts themselves carried out ransomware attacks

Two U.S. cybersecurity employees pleaded guilty to using BlackCat/ALPHV ransomware to extort victims, launder proceeds, and face up to 20 years in prison.
Information security
fromIT Pro
2 months ago

Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network Academy

Two former Cisco Network Academy trainees allegedly used insider product knowledge to help Salt Typhoon conduct large-scale telecom espionage, intercepting unencrypted calls and texts.
#database-deletion
fromIT Pro
3 months ago

November rundown: CrowdStrike's insider threat

The individual was believed to have been paid around $25,000 for this, which all things considered, I think, is quite low when you're risking being fired and, you know, a potential jail sentence in the aftermath of this. So these were leaked on Telegram. CrowdStrike, obviously, was made aware of this and they reacted pretty swiftly like we mentioned. That person has since been dismissed, I don't think it was too much of an issue for HR in that situation.
Information security
Information security
fromTechCrunch
3 months ago

CrowdStrike fires 'suspicious insider' who passed information to hackers | TechCrunch

CrowdStrike fired a suspicious insider who allegedly shared internal screenshots with the Scattered Lapsus$ Hunters hacking collective; the company says its systems were not compromised.
Information security
fromTheregister
3 months ago

Rogue techie pleads guilty in $862K employer attack

An Ohio IT contractor pleaded guilty to hacking his former employer, resetting 2,500 passwords via stolen credentials and PowerShell, causing nearly $1,000,000 in damages.
fromDataBreaches.Net
4 months ago

UK: Woman charged after NHS patients' records accessed in data breach - DataBreaches.Net

Today's reminder of the insider threat comes to us from the National Health Service in the U.K. Craig Meighan and Billy Gaddi report: A woman has been charged after Scots patients had their private medical records accessed during an NHS data breach. Reports suggest around 100 patients in NHS Lothian could have had their records accessed as a result of the incident. The health board said it discovered patients in the region may have had their information "inappropriately accessed" during routine monitoring.
Privacy professionals
Information security
fromThe Hacker News
4 months ago

ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising

Attackers prioritize fewer high-impact targets while defenders face expanding blind spots and rising insider-enabled transfers of sensitive cyber-exploit tools to foreign buyers.
Privacy technologies
fromdatabreaches.net
4 months ago

Romanian prisoner hacks prison IT system in plot made for a Netflix movie

A prisoner exploited tablets and kiosks to hack Romania's prison management platform, gaining access to inmate accounts and platform functions across multiple penitentiaries.
Privacy professionals
fromDataBreaches.Net
4 months ago

Harris Health discloses insider-wrongdoing breach that went on for a decade - DataBreaches.Net

Employee misused patient records at Harris Health, exposing sensitive PHI of over 5,000 patients over a decade, prompting notifications and law enforcement involvement.
fromSecurityWeek
4 months ago

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach

Microsoft announced that its SIEM and SOAR solution Sentinel has evolved into a unified AI-ready platform that connects users, agents, devices, actions, and risks across the security environment. This enables defenders to trace attack paths, assess blast radius, and prioritize responses with greater clarity. Security Copilot builds on this foundation, allowing teams to create custom AI agents (no coding required) that integrate seamlessly into daily workflows.
Information security
Artificial intelligence
fromNextgov.com
5 months ago

Military AI needs guardrails-not to slow it down, but to keep it useful

The military must adapt and embed context-appropriate AI guardrails to prevent external and insider misuse while allowing necessary lethality and rapid R&D.
fromIT Pro
5 months ago

Nearly 700,000 customers impacted after insider attack at US fintech firm

A US-based fintech firm has warned customers their data may have been exposed following an insider attack.
Information security
fromComputerWeekly.com
5 months ago

Students an increasing source of cyber threat in UK schools | Computer Weekly

Students acting maliciously - often for fun - are increasingly the cause of cyber attacks affecting schools and colleges in the UK, according to new data from the Information Commissioner's Office, which today warned that the culprits may be setting themselves up for a life of cyber crime.
Education
fromwww.bbc.com
5 months ago

Children hacking their own schools for 'fun', watchdog warns

Since 2022, the ICO has investigated 215 hacks and breaches in education settings and says 57% were carried out by children. According to the new data, almost a third of the breaches involved students illegally logging into staff computer systems by guessing passwords or stealing details from teachers. In one incident, a seven-year-old was involved in a data breach and subsequently referred to the National Crime Agency's Cyber Choices programme to help them understand the seriousness of their actions.
Information security
Information security
fromThe Hacker News
5 months ago

You Didn't Get Phished - You Onboarded the Attacker

Onboarding processes and remote hiring create attack surfaces exploited by fake hires who bypass email defenses to gain legitimate credentials and access.
Information security
fromIT Pro
5 months ago

Security experts weigh in on 'offboarding' practices after former Intel worker stole documents before changing jobs

Organizations must strengthen offboarding by coordinating security and HR to revoke access promptly and prevent departing employees from taking or leaking sensitive information.
fromDataBreaches.Net
6 months ago

Developer jailed for taking down employer's network with kill switch malware - DataBreaches.Net

A US court sentenced a former developer at power management biz Eaton to four years in prison after he installed malware on the company's servers. Davis Lu, 55, spent a dozen years at Eaton and rose to become a senior developer of emerging technology, before the company demoted him after restructuring. Lu unwisely responded to that setback by installing a "kill switch" that would activate if the company revoked his network access.
US news
#malware
Canada news
fromDatabreaches
8 months ago

Battlefords Union Hospitals notifies patients of employee snooping in their records

Insider threats can significantly compromise patient privacy in healthcare settings.
Battlefords Union Hospitals ensured patient notification and acted against the employee involved in unauthorized access.
fromSecuritymagazine
8 months ago

Former CIA Analyst Unlawfully Transmits National Defense Data, Sentenced to Prison

Rahman unlawfully retained and transmitted Top Secret National Defense Information, affecting national security and exposing sensitive details about a U.S. ally.
Information security
Information security
fromDatabreaches
9 months ago

Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies

Defense contractor arrested for leaking Navy information to suspected Pakistani spies.
Access to restricted naval installations posed a security risk.
Information security
fromTheregister
9 months ago

FBI arrests DoD IT worker, claim he tried to leak intel

A DIA IT specialist attempted to share top secret information with a foreign government, highlighting serious insider threat concerns.
fromDatabreaches
10 months ago

Saskatoon children's hospital nurse unlawfully snooped on records of 314 patients: privacy report

The RN accessed medical records for reasons unrelated to patient care while on a leave of absence, highlighting serious weaknesses in privacy protections.
Privacy professionals
[ Load more ]