Russian cyber criminals continue to court their Chinese counterparts in hopes of forming mutually beneficial avenues of collaboration.
Stories by Christopher Burgess
A U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.
The recently uncovered Operation CuckooBees campaign shows how serious China is about using IP theft as a competitive advantage.
The alert provides detailed information on Russian government and state-sponsored cyber criminal groups as well as guidance for reducing risk.
Hacktivists, Russia and its proxies have taken cyber actions against organisations for their decisions regarding the attack on Ukraine.
MITRE Engenuity and major business partners have developed an knowledge base of malicious insiders' tactics, techniques and procedures.
Both Russia and Ukraine are making demands and requests of companies to help control information around their conflict. However they respond has consequences.
Departing Motorola employees took thousands of documents with them in 2008 when they were hired by a competitor, but it wasn't discovered until 2017.
The destructive attacks follow a US government warning for a "heightened state of awareness" and to follow state-sponsored threat mitigation advice.
Pfizer, Ubiquiti and Code42 all faced real or potential insider threats that could have been a lot worse if they did not have a plan to deal with them.
All encrypted data will eventually become vulnerable to quantum computing along with the secrets they hold.
Investigators claim Ubiquiti employee Nikolas Sharp stole company data and then played the role of whistleblower to draw attention away from is actions.
PIPL's data localisation mandate places unique requirements on businesses operating in China, and regulators have great leeway to assess fines.
Attackers broke into the Twitch house and cleaned out everything. Following least-privilege access principles will help others avoid that scenario.
Device / machine identity, especially in association with robotic process automation, can be a conduit for intentional and unintentional insider breaches.