August 1, 2024 | KnowBe4 revealed a North Korean hacker tried to infiltrate its systems using a stolen identity and AI-enhanced image. The hacker secured a job, passed background checks, and attempted to load malware onto a company device. The SOC quickly contained the device, preventing a breach.
Security Leaders React:
Stephen Kowski, SlashNext: “State-sponsored attackers are creating convincing fake identities. We need better vetting, constant monitoring, and collaboration across HR, IT, and security teams.”
Piyush Pandey, Pathlock: “Continuous monitoring and strict access controls are crucial to detect and respond to suspicious activities.”
Callie Guenther, Critical Start: “Companies must scrutinize resumes, verify identities, and monitor for unusual behavior to counter sophisticated threats.”
John Bambenek, Bambenek Consulting: “Ensuring employee and contractor security has always been challenging. Vigilant monitoring and identifying bad actors upfront are essential.”
Thanks for signing up!