threat actor


Also found in: Dictionary, Financial.

threat actor

An individual or entity that poses a threat to the security of an organization. Also called a "malicious actor," the threat actor may be external, which is outside the organization and generally the most dangerous. An internal threat actor can be an employee or contractor that has greater access to sensitive data. See hacktivist, hacker and cybercrook.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
The continued activity is associated with relationships forming among 'secure syndicates' that closely collaborate and use the same tools - suggesting a major a change in how threat actors work together in the underground economy.
Kaspersky Lab researchers have uncovered a technically sophisticated cyberespionage framework that has been active since at least 2013 and appears to be unconnected to any known threat actors. The framework, which researchers have named TajMahal, features around 80 malicious modules and includes a functionality never before seen in an advanced persistent threat such as the ability to steal information from printer queues and to grab previously seen files from a USB device the next time it reconnects.
This poses a huge opportunity for threat actors as they do not have to defeat an organization's security procedures, they only have to compromise a trusted third-party in the supply chain.
The White Company is the first threat actor of any kind that we've encountered that targets and effectively evades no fewer than eight different antivirus products," Livelli says.
"Threat actors need to switch up their arsenal from time to time," Lipovsky said.
The report is based on information gathered during investigations conducted by FireEye's security analysts in 2017 and uncovers emerging trends and tactics that threat actors used to compromise organisations.
In the hands of a sophisticated threat actor, the same tool and technique could have enabled a foothold into target networks."
Acting in concert with RisklQ's machine learning, virtual user technology can provide a deep level of analysis of how threat actors are behaving, their underlying infrastructure, and the techniques they use.
First, it addressed cyberspace practitioners' understanding of the meaning in the response assigned to a cyber threat actor utilizing a predetermined category that classifies the actor.
1) Establish Controls--Every organization that operates critical infrastructure should establish controls that increase the cost, risk, and intellectual energy required for a threat actor to be successful.
In addition, Haqqani "founded a madaris (plural madrassa) network that played a key role in spreading his jihadist world view." (20) In duality, the demonstration of support and civic interaction serves populace needs and threat actor operations.
David Alt's view of the triple threat actor in the USA is also applicable here in the music theater industry in Australia.