Good morning and happy Monday! To start off the week, I want to talk about a few events coming up, that are most definitely worth attending. The first is called the “4th Annual Cyber Security for Defense,” and it is taking place today through Wednesday, the 27th, in Washington D.C. Second is the “TechTalk Summits,” which is taking place on Thursday, June 28th, at the Capital Grille in Kansas City. This is supposed to be a laid-back event, allowing you to network with others in the technology community, and learn about the latest technologies.
Tesla’s Insider Sabotage
Elon Musk, Tesla’s CEO, sent an email out last week to the employees at Tesla, informing them of a saboteur within the company. He told the employees that the saboteur “made direct code changes to the Tesla Manufacturing Operating System under false usernames and exported large amounts of highly sensitive Tesla data to unknown third parties.” The responsible person, named Martin Tripp, has been caught and admitted to exporting data to outsiders. He claims that he did it after being denied a promotion as a type of revenge. On Wednesday, June 20th, it was announced that Tesla has filed a lawsuit against the now former employee for allegedly illegally exporting gigabytes of confidential data. The suit also alleges that the former employee wrote computer code to export Tesla’s data to outsiders, and made false statements to the media. This situation is a prime example of the importance of cybersecurity training within an organization. Also, maintaining continuous monitoring on activities being performed by employees through file monitoring and active directory monitoring is extremely important, as it can help detect and prevent situations like this one.
Olympic Destroyer is Back
If you are unfamiliar with the “Olympic Destroyer”, it is the famous threat that hit the opening ceremony of the Winter Olympic Games in Pyeongchang. It has recently been discovered that the hacking group behind it is still active, months later. It seems to now be targeting Germany, France, Switzerland, the Netherlands, Russia, and Ukraine. The group’s focus is on organizations involved in chemical and biological threat protection. The group spreads its malware through spear-phishing documents, which were designed to provide access to the compromised computers. It is still left a mystery as to who these attackers are, but they are still out there as an active threat.
Thank you for tuning in to this week’s segment of “Mondays With Miranda!” Keep up to date with current news by following NeQter Labs on Twitter, Facebook, and LinkedIn. As always, if anyone has any questions, feel free to email [email protected]. Have a great week everyone!
References