DTEX i³ Threat Advisory Reveals Growing Risk of Credential Abuse by Outside Adversaries

In today’s digital age, where the line between personal and professional life is increasingly blurred, the storage of corporate credentials on personal accounts has emerged as an attractive vector for outside adversaries. DTEX i3 has released a new Insider Threat Advisory highlighting the growing risk of credential bleed between corporate ... Read More

CrowdStrike Threat Hunting Report Reveals Growing Stealth of Insider Threats

CrowdStrike’s 2024 Threat Hunting Report echoes many of the findings from DTEX i3’s 2024 Insider Risk Investigations Report. The fact is, the lines between internal and external threats are rapidly blurring. Nation state actors are increasingly exploiting trusted insiders and channels to access and exfiltrate sensitive data. Key findings: Nation ... Read More

DTEX i³ Issues New Threat Advisory for Disrupting Foreign Interference

The DTEX Insider Intelligence and Investigations (i3) team has released a new threat advisory to help organizations detect, deter, and disrupt insider threat cases involving foreign interference. The advisory includes important Potential Risk Indicators (PRIs) and behavioral insights that organizations can leverage to proactively intercept malicious insiders intending to conduct ... Read More

How Behavioral Intelligence Can Combat Foreign Interference

Foreign interference is arguably the biggest threat facing national security today, as adversaries increasingly weaponize insiders to advance their strategic objectives. DTEX first revealed the gravity of the threat in the 2024 Insider Risk Investigations Report, noting a 70% increase in organizations seeking support in protecting against foreign interference since ... Read More

DTEX i3 Issues Threat Advisory for Mitigating Third-Party Zoom Risk

Video conferencing applications like Zoom have become ubiquitous with the remote workforce, but they can also introduce a new vector for insider risk. The DTEX i3 team has observed an increase in remote control sharing with unauthorized third parties over video conferencing apps. Of significant concern is the potential for ... Read More
2024 RSA Conference, Blurred Lines

The Rise of AI and Blended Attacks: Key Takeaways from RSAC 2024

The 2024 RSA Conference can be summed up in two letters: AI. AI was everywhere. It was the main topic of more than 130 sessions. Almost every company with a booth in the Expo Hall advertised AI as a component in their solution. Even casual conversations with colleagues over lunch ... Read More

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways to break in and execute attacks. The DTEX i3 Team has issued a Threat Advisory to provide insight on how malicious insiders are exploiting commonly trusted tools, such as Google ... Read More

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of AI research to nuclear trade secrets, the appetite to steal and exploit sensitive data for competitive advantage has never been greater. Espionage attempts are growing in stealth and frequency – and governments, tech, ... Read More

Zero Trust Meets Insider Risk Management

What do Jack Teixeira, Joshua Schulte, and Korbein Schultz have in common? All three worked for the federal government in some capacity, and all three used their insider access for nefarious purposes, got caught and were arrested. Teixeira, while with the Air National Guard, shared classified documents on social media, ... Read More
™

DTEX i³ Issues Threat Advisory for Detecting the Use of Multiple Identities

The DTEX i3 team has issued a new Threat Advisory following recent investigations linking the use of multiple personal accounts on corporate devices with side gigs and the spread of extremist materials. The i3 Threat Advisory highlights how lenient security policies surrounding personal accounts and corporate data are making organizations ... Read More
Loading...

Application Security Check Up