How to Mitigate the Risk of Rogue Employees


Rogue employees present significant financial and cybersecurity risks to organizations. Rapid7 threat researchers and penetration testers are actively observing how malicious actors exploit hiring pipelines to infiltrate businesses. This blog highlights real-world tactics, including:

  • Insider Reconnaissance: Rogue applicants leveraging interviews to map office layouts, identify vulnerable devices, and even plant malware during site visits.

Read more…
Source: Rapid7


Sign up for our Newsletter


Related:

  • How did a ‘bank snooping’ scandal ensnare politicians in Italy?

    October 14, 2024

    Italian Prime Minister Giorgia Meloni is at the centre of a “snooping scandal” in which a bank branch employee at Italy’s biggest bank is alleged to have illegally accessed and “spied on” thousands of private accounts. A clerk at Banca Intesa Sanpaolo has been accused of gaining unauthorised access to more than 3,500 accounts belonging to ...

  • How Effective Is Your Insider Risk Program?

    September 3, 2024

    Insider threats continue to increase and make headlines. So, it is no surprise that many CISOs consider it a high priority to proactively identify and prevent these types of threats. In fact, research for the 2024 Voice of the CISO report from Proofpoint found that a third of CISOs globally see insider threats as their biggest ...

  • 2024 U.S. Federal Elections: The Insider Threat

    June 28, 2024

    The Federal Bureau of Investigation (FBI), in coordination with the Department of Homeland Security’s (DHS) Office of Intelligence and Analysis (I&A), the Cybersecurity and Infrastructure Security Agency (CISA), and the U.S. Election Assistance Commission (EAC) prepared this overview to help partners defend against insider threat concerns that could materialize during the 2024 election cycle. For years, ...

  • How to Recognize and Defend Against Malicious Insider Threats

    June 12, 2024

    Insider threats arise from careless users, users with compromised credentials, or users who seek to cause harm intentionally. The latter type of user—the malicious insider—can be the most daunting for security teams to manage. It requires them to analyze a user’s behavior and determine whether they have bad intentions. Although less frequent, malicious insiders are costly. ...

  • UK: The Princess of Wales’s hospital data breach not referred to police due to suspected ‘decoy’ plan

    June 3, 2024

    The Princess of Wales’s hospital data breach has not been referred to police as an expert explains that a “decoy” plan could have been in use – meaning her actual medical files were not accessed by the perpetrators. Despite Health Minister Maria Caulfield revealing back in March that the police had been asked to look into ...

  • Microsoft employees exposed internal passwords in security lapse

    April 9, 2024

    Microsoft has resolved a security lapse that exposed internal company files and credentials to the open internet. Security researchers Can Yoleri, Murat Özfidan and Egemen Koçhisarlı with SOCRadar, a cybersecurity company that helps organizations find security weaknesses, discovered an open and public storage server hosted on Microsoft’s Azure cloud service that was storing internal information relating ...