CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// Insider Threat & DLP
Intel Feed

cyberintel.kalymoon.com  ·  411 articles  ·  updated every 4 hours · grows forever

411Total
385Full Text
May 15, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◐ Insider Threat & DLP Apr 18, 2026
Critical AI Vulnerabilities in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and Remote Code Execution - Rescana

Critical AI Vulnerabilities in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and Remote Code Execution Rescana

Rescana Read →
◐ Insider Threat & DLP Apr 17, 2026
CrySome RAT: Multi-Layered Userland Evasion and Post-Exploitation Framework

Overview CrySome RAT is a .NET-based remote access trojan designed for post-compromise control, credential harvesting, and covert system interaction. The malware prioritizes persistence, defense evasi…

Gurucul Read →
◐ Insider Threat & DLP Apr 17, 2026
Unveiling AI Agent Vulnerabilities Part III: Data Exfiltration - www.trendmicro.com

Unveiling AI Agent Vulnerabilities Part III: Data Exfiltration www.trendmicro.com

www.trendmicro.com Read →
◐ Insider Threat & DLP Apr 16, 2026
Proofpoint DLP vs. Trellix DLP: Which is the Best Solution?

Proofpoint DLP and Trellix DLP are two notable data loss prevention solutions. In this blog, we’ll analyze both platforms in depth and see how they compare. We’ll also introduce Teramind as a compelli…

Teramind Read →
◐ Insider Threat & DLP Apr 16, 2026
Top 10 Best Insider Risk Management Platforms – 2026 - CyberSecurityNews

Top 10 Best Insider Risk Management Platforms – 2026 CyberSecurityNews

CyberSecurityNews Read →
◐ Insider Threat & DLP Apr 15, 2026
Mandatory Access Control vs. Discretionary Access Control: Which to Choose?

Strong access controls are vital for protecting sensitive data and preventing cyberattacks against your organization. However, choosing the right access management model requires thorough consideratio…

Ekran System Read →
◐ Insider Threat & DLP Apr 15, 2026
Insider Threat Program Best Practices for 2026 - Security Boulevard

Insider Threat Program Best Practices for 2026 Security Boulevard

Security Boulevard Read →
◐ Insider Threat & DLP Apr 15, 2026
Time Doctor vs. Teramind: Which is the Better Option?

Time Doctor and Teramind offer features for managing employees’ time, activity tracking, and productivity analytics. In this blog, we’re comparing the two tools, covering their features, use cases, us…

Teramind Read →
◐ Insider Threat & DLP Apr 15, 2026
Researcher Uncovers 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks - The Hacker News

Researcher Uncovers 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks The Hacker News

The Hacker News Read →
◐ Insider Threat & DLP Apr 14, 2026
Leading the Autonomous SOC: The Future of Machine-Speed Security

Introduction The global cyber landscape has reached a turning point. Attackers are leveraging automation, distributed computing, and adaptive AI to expand their operations with unprecedented precision…

Gurucul Read →
◐ Insider Threat & DLP Apr 14, 2026
How To Track Employee AI Usage

Artificial intelligence is rapidly moving from an experimental phase to a fundamental business requirement. While tools like ChatGPT can turn hours of data analysis into minutes of work, they also int…

Teramind Read →
◐ Insider Threat & DLP Apr 13, 2026
LiteLLM Supply Chain Compromise: Downstream Impact Analysis with Mercor Breach Case Study

Executive Summary Supply chain compromise affecting the LiteLLM library (versions v1.82.7 and v1.82.8) resulted in the distribution of malicious packages via PyPI. These packages contained embedded da…

Gurucul Read →
◐ Insider Threat & DLP Apr 13, 2026
What is Generative AI Security? Types, Risks & Best Practices

Generative AI security is the practice of protecting generative artificial intelligence models, applications, and their underlying training data from cyber attacks, data leakage, and unauthorized acce…

Teramind Read →
◐ Insider Threat & DLP Apr 13, 2026
Potential Massive Twitter/X Data Breach 2025: Insider Threat Exposes 2.8 Billion Accounts - Rescana

Potential Massive Twitter/X Data Breach 2025: Insider Threat Exposes 2.8 Billion Accounts Rescana

Rescana Read →
◐ Insider Threat & DLP Apr 13, 2026
Insightful vs. Monitask: Features, Pros, Cons & Pricing

Insightful and Monitask are two well-known employee productivity tools. In this article, we’ll examine both platforms, comparing their key features, pros, cons, and ideal use cases. Our analysis will …

Teramind Read →
◐ Insider Threat & DLP Apr 13, 2026
Enterprise data loss prevention market to reach $6.265 billion by 2026 - Help Net Security

Enterprise data loss prevention market to reach $6.265 billion by 2026 Help Net Security

Help Net Security Read →
◐ Insider Threat & DLP Apr 12, 2026
‘GrafanaGhost’ vulnerability allowed for silent data exfiltration through AI workflows - SiliconANGLE

‘GrafanaGhost’ vulnerability allowed for silent data exfiltration through AI workflows SiliconANGLE

SiliconANGLE Read →
◐ Insider Threat & DLP Apr 11, 2026
How generative AI is expanding the insider threat attack surface - IBM

How generative AI is expanding the insider threat attack surface IBM

IBM Read →
◐ Insider Threat & DLP Apr 11, 2026
Qifa Zhou Honored for Contributions to the Biomedical Ultrasound Field - USC Viterbi School of Engineering

Qifa Zhou Honored for Contributions to the Biomedical Ultrasound Field USC Viterbi School of Engineering

USC Viterbi School of Engineering Read →
◐ Insider Threat & DLP Apr 10, 2026
Proofpoint vs. Teramind: Which ITM Software is Best?

Proofpoint Insider Threat Management (ITM) and Teramind are two reputable solutions for insider threat and data loss prevention (DLP). In this blog, we’re comparing the two tools, covering their featu…

Teramind Read →
◐ Insider Threat & DLP Apr 10, 2026
Average ransomware payment now $1.1M: Coveware charts rise of data exfiltration - Blocks & Files

Average ransomware payment now $1.1M: Coveware charts rise of data exfiltration Blocks & Files

Blocks & Files Read →
◐ Insider Threat & DLP Apr 10, 2026
Jazz: $61 Million Raised For AI-Powered Data Loss Prevention Platform - Pulse 2.0

Jazz: $61 Million Raised For AI-Powered Data Loss Prevention Platform Pulse 2.0

Pulse 2.0 Read →
◐ Insider Threat & DLP Apr 09, 2026
Hubstaff vs. Teramind – Which Is Best For Productivity?

Scroll down for a comparison between Teramind and Hubstaff, two employee productivity and monitoring tools. We’ll cover their features, use cases, user reviews, pricing, and the differences between th…

Teramind Read →
◐ Insider Threat & DLP Apr 09, 2026
Phantom Workforce: The Insider Threat You Didn’t Hire

A new developer joins your team. They hit every deadline, attend every sync, and follow every security protocol to the letter. Six months later, you realize that “person” never existed. It was a state…

Gurucul Read →
← Prev 3 / 18 Next →