Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

June 25, 2025

Meta is adding an AI-powered overview to WhatsApp

June 25, 2025

Sitch's new dating app fuses human matchmaking with AI

June 25, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Meta is adding an AI-powered overview to WhatsApp

    June 25, 2025

    Sitch's new dating app fuses human matchmaking with AI

    June 25, 2025

    Apple Sports app adds live tennis scores and a redesigned home screen

    June 25, 2025

    Bumble to solve 30% of employees

    June 25, 2025

    Julie Bornstein's Daydream is releasing AI-powered chatbots for fashion-related shopping

    June 25, 2025
  • Crypto

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025

    Unique, a new social media app

    June 17, 2025

    xNotify Polymarket as partner in the official forecast market

    June 6, 2025
  • Security

    Ring cameras and doorbells now use AI to provide specific descriptions of motion activities

    June 25, 2025

    The US bans WhatsApp from House of Leprancatives Staff Devices

    June 24, 2025

    According to Canada, the carrier was breached by China-related spying hacking

    June 23, 2025

    US insurance giant AFLAC says customer personal data was stolen during a cyber attack

    June 23, 2025

    Iran's government says it will shut down the internet to protect against cyber attacks

    June 20, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Kleida Martiro leads the AI ​​scale conversation at TC All Stage

    June 25, 2025

    Introducing the release stage that will be released in 2025

    June 25, 2025

    The $1,200 tequila on the all-in-podcast is already sold out

    June 24, 2025

    Katie Haun on genius behavior and what it might mean for the future of code

    June 24, 2025

    WISPR Flow raises $30 million from Menlo Ventures for its AI-powered Dictation app

    June 24, 2025
TechBrunchTechBrunch

What are today's most underrated security threats? Advanced and tenacious teenagers

TechBrunchBy TechBrunchNovember 1, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


If you ask the field's top cybersecurity leaders what's on their worry list, you might not expect bored teenagers to be top of mind. But in recent years, this entirely new generation of money-driven cybercrime has led to some of the largest hacks in history, and shows no signs of slowing down.

Meet the “advanced and tenacious teenager” as the security community calls him. These are skilled, financially motivated hackers like Lapsus$ and Scattered Spider who have proven capable of digitally infiltrating hotel chains, casinos, and tech giants. These hackers use tactics that rely on credible email lures and persuasive phone calls posing as the company's help desk to trick unsuspecting employees into accessing company passwords and networks. access can be waived.

These attacks were highly effective, causing massive data breaches that affected millions of people and resulted in huge ransoms being paid to eliminate the hackers. Having demonstrated hacking capabilities once limited to only a few nations, threats from bored teenagers have led many companies to believe that employees on their networks are really who they say they are. I don't know if that's the case, and I've come to realize that it's not actually the case. stealth hacker.

From the perspective of two veteran security gurus, are we underestimating the threat of bored teenagers?

“It's probably not going to last very long,” Darren Gruber, technical advisor for security and trust at database giant MongoDB, said on a stage panel at TechCrunch Disrupt on Tuesday. “They don't feel as threatened, they may not be within U.S. jurisdiction, they're very technical, and they tend to learn these things in different places,” Gruber said.

Additionally, an important automatic benefit is that these threat groups are also given more time.

“This is a different motivation than the traditional adversaries that businesses see,” Gruber told the audience.

Mr. Gruber has first-hand experience dealing with some of these threats. MongoDB was compromised in late 2023, and some metadata such as customer contact information was stolen, but there was no evidence that customer systems or databases were accessed. By all appearances, the intrusion was limited, and Gruber said the attack was consistent with tactics used by Scattered Spider. He said the attacker used a phishing scam to gain access to MongoDB's internal network pretending to be an employee.

Obtaining this attribution will help network defenders defend against future attacks, Gruber said. “It helps to know who you're dealing with,” he says.

Speaking alongside Gruber at TechCrunch Disrupt, Heather Gant Evans, chief information security officer at fintech card issuer Marketa, told the audience that the motivations of the new threat group made up of teenagers and young adults were “believable.” Their behavior is “incredibly unpredictable,” he said. There were no particularly sophisticated tactics or techniques, such as sending phishing emails or tricking phone company employees into forwarding someone's phone number.

A photo of Zach Whitaker on stage, Heather Gant-Evans with microphone, and Darren Gruber.Image credit: Getty Images

“The trends we're seeing are really about insider threats,” Gant-Evans said. “It's much easier to get in through people than it is to hack with sophisticated malware or exploit vulnerabilities, and they'll continue to do that.”

“Some of the biggest threats we're looking at right now are identity-related, and there are a lot of questions around social engineering,” Gruber said.

He said the attack surface is not limited to email or text phishing, but extends to any system that interacts with employees or customers. That's why companies like MongoDB prioritize identity and access management to ensure only employees have access to the network.

Gant-Evans said these were all attacks with a “human element”, coupled with hackers' often unpredictable motivations, such as the neurodivergent ways of thinking and acting that some young hackers have. There's a lot to learn.”

“They don't care that you don't like mixers,” Gant-Evans says. “Those of us in cybersecurity need to be better at embracing neurodiverse talent.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ring cameras and doorbells now use AI to provide specific descriptions of motion activities

June 25, 2025

The US bans WhatsApp from House of Leprancatives Staff Devices

June 24, 2025

According to Canada, the carrier was breached by China-related spying hacking

June 23, 2025

US insurance giant AFLAC says customer personal data was stolen during a cyber attack

June 23, 2025

Iran's government says it will shut down the internet to protect against cyber attacks

June 20, 2025

According to web surveillance companies, the internet will collapse across Iran

June 18, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

June 25, 2025

Meta is adding an AI-powered overview to WhatsApp

June 25, 2025

Sitch's new dating app fuses human matchmaking with AI

June 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.