At Natsar we are dedicated to helping executives and decision-makers understand cybersecurity. This post will provide a non-technical overview of the Log4j (also known as log4shell) vulnerability and provide a resource for executives to use when talking with their IT teams or Managed Service Providers (MSPs).
Unfortunately, Ubiquiti learned a very public and expensive lesson on insider threats. Between lost future revenue and the $4 billion in lost stocks due to this event, Ubiquiti will be feeling this attack for years. Learn about some of the missed opportunities to detect this attack and how Natsar can help you prevent something like this from happening to you.
This post is the first of two related to the insider threat attack suffered by Ubiquiti, Inc. (NYSE:UI). Ubiquiti develops technologies such as network switches and routers, wireless networking equipment, phones, security cameras, physical access control devices, and more.
Organizations place a tremendous amount of trust in their Information Technology (IT) staff, but often lack anyone in senior leadership positions that are technical enough to provide proper oversight. While most IT employees and organizations are trustworthy professionals, like anything else, there exists a possibility for fraud, waste, and abuse.
A key component to any successful and mature Information Technology (IT) team is a disciplined change control process. Few things are more frustrating to a CIO than having a service affecting outage and not being able to immediately identify recent changes to the environment.
In order to use social media evidence in a criminal trial, attorneys must ensure that the evidence is properly acquired and authenticated. As this case from Vermont highlights, evidence must be introduced to sufficiently prove that social media content can be attributed to a party.
Coding used by web developers to improve the user experience (UX) of web browsing can cause data to be stored within a user’s device without the knowledge or interaction of the user. An untrained digital forensic analyst or a person reviewing the results of a forensic analysis that lacks proper context may make incorrect assumptions about a user’s activities.
If a hacker was able to compromise your device there are several things they may be able to do. The capabilities of the hacker is driven by the sophistication of the malware, the stability of the device’s network connection, and any security software or devices that impair or remove the malware’s ability to function.
The Coronavirus 2019 (COVID-19) pandemic has forced businesses, organizations, and government agencies to immediately change their operating model, resulting in furloughs and sending workers home to telework. Employers are struggling to ensure their employees are safe, healthy, productive, and equipped during this time.