DTEX i³ Threat Advisory Reveals Growing Risk of Credential Abuse by Outside Adversaries

In today’s digital age, where the line between personal and professional life is increasingly blurred, the storage of corporate credentials on personal accounts has emerged as an attractive vector for outside adversaries ...

DTEX i³ Issues New Threat Advisory for Disrupting Foreign Interference

The DTEX Insider Intelligence and Investigations (i3) team has released a new threat advisory to help organizations detect, deter, and disrupt insider threat cases involving foreign interference. The advisory includes important Potential ...

How Behavioral Intelligence Can Combat Foreign Interference

Foreign interference is arguably the biggest threat facing national security today, as adversaries increasingly weaponize insiders to advance their strategic objectives. DTEX first revealed the gravity of the threat in the 2024 ...

DTEX i3 Issues Threat Advisory for Mitigating Third-Party Zoom Risk

Video conferencing applications like Zoom have become ubiquitous with the remote workforce, but they can also introduce a new vector for insider risk. The DTEX i3 team has observed an increase in ...

DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse

Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways to break in and execute attacks. The DTEX i3 Team has issued ...

Countering Foreign Interference: 2024 Insider Risk Report Takeaways

There has been no shortage of incidents related to foreign interference and IP theft. From theft of AI research to nuclear trade secrets, the appetite to steal and exploit sensitive data for ...
™

DTEX i³ Issues Threat Advisory for Detecting the Use of Multiple Identities

The DTEX i3 team has issued a new Threat Advisory following recent investigations linking the use of multiple personal accounts on corporate devices with side gigs and the spread of extremist materials ...

What is a Behavioral Risk Indicator? Demystifying Insider Risk Indicators

Insiders – the people with legitimate access to an organization’s data and systems – are the root cause of most cybersecurity incidents. As humans, insider risks are complex. Their behaviors and intentions ...

DTEX i³ Issues Threat Advisory for Mitigating Insider Abuse of Insecure Web Apps

Web applications offer powerful workforce efficiencies, but they are not without their risks. Misconfiguration of web applications can open the door to insider abuse or misuse, throwing sensitive company data and employee ...

Pentagon Compromise | The Most Effective Insider Threat Sensors Are People

DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four months since Jack Teixeira was cast into the public eye for allegedly ...

Application Security Check Up