Tuesday, March 21, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Runtime Security Observability for Containerized Workloads in AWS
  • High Availability: How It Works and Why It’s Important
  • USENIX Security '22 - 'SCRAPS: Scalable Collective Remote Attestation For Pub-Sub IoT Networks With Untrusted Proxy Verifier’
  • Financial Services Firms: Address FFIEC’s Stringent API Security Regulations with Noname Security
  • Another One Bites the Dust: The (Apparent) End of Breach Forums
SBN News Security Bloggers Network Threats & Breaches 

Home » Cybersecurity » SBN News » Tesla CEO Elon Musk Accuses Employee of ‘Extensive and Damaging Sabotage’

SBN

Tesla CEO Elon Musk Accuses Employee of ‘Extensive and Damaging Sabotage’

by Maritza Santillan on June 19, 2018

A disgruntled employee at Tesla has caused “extensive and damaging sabotage,” according to the company’s CEO Elon Musk.

In an email sent to employees late Sunday night, Musk revealed an employee had broken into the company’s computer systems in an effort to disrupt operations.

The message, as first reported by CNBC, stated the employee made direct code changes to the Tesla Manufacturing Operating System using false usernames. The unnamed employee also exported “large amounts of highly sensitive Tesla data” to unknown third parties.

“His motivation is that he wanted a promotion that he did not receive,” wrote Musk. “In light of these actions, not promoting him was definitely the right move,” he said.

Musk added that an in-depth investigation would continue this week, asking employees to remain “extremely vigilant.”

Tim Erlin, VP of Product Management and Strategy at Tripwire, noted that while insider threats have decreased in visibility as we’ve seen more sophisticated nation-state and cybercrime attacks, such incidents still have the ability to cause significant damage.

“Telsa will have to investigate all the changes made by this rogue employee, including those made under falsified username and credentials. Without detailed change detection, that’s an incredibly tedious task,” Erlin said.

“Sometimes even authorized changes can be suspicious and require investigation. Organizations are used to looking for unauthorized changes as a means of detecting malicious activity, but a skilled insider isn’t as likely to get caught in the same way.” Added Erlin.

The incident comes as the Palo Alto-based company ramps up the production of its Model 3, aiming to produce 5,000 or more vehicles per week by the end of June.

In a separate email sent Monday morning, employees were informed of a small fire that briefly halted production but was quickly contained, reported CNBC.

“Could just (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Maritza Santillan. Read the original post at: https://www.tripwire.com/state-of-security/latest-security-news/elon-musk-accuses-employee-of-sabotage/

June 19, 2018June 19, 2018 Maritza Santillan Elon Musk, insider threat, Latest Security News, Tesla
  • ← Clustering App Attacks with Machine Learning Part 3: Algorithm Results
  • Conversations with the Inventor of Wild Card Certificates—Part 2: Beware of the Easy Button →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Will Consumers Punish Vendors That Suffer a Data Breach?
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities
Six Ways to Foster a Security Mindset in Engineering Teams
DNSSEC is the Key to a Healthy Future for the Internet
Coverage Advisory for CVE-2023-23397: Microsoft Outlook Elevation of Privilege Vulnerability
Telecom Fraud: Detection & Protection for Telcos
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media Companies
Profiling a Currently Active Vendor of Western Union and Banking Logs Including Stolen Credit Cards Transfer Details – An Analysis
Analysis: Microsoft Patch Tuesday Update for March, 2023

Upcoming Webinars

Apr 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Apr 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Apr 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Apr 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Apr 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Apr 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | 4 days ago 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Cybersecurity Leaders Stressed Over Email Security
Application Security Cloud Security Cybersecurity Endpoint Featured Mobile Security Network Security News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Cybersecurity Leaders Stressed Over Email Security

March 21, 2023 Nathan Eddy | Yesterday 0
Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast
Analytics & Intelligence Application Security Blockchain Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Digital Currency Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Malware Mobile Security Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast

March 16, 2023 Richi Jennings | Mar 16 0
Dell Adds CrowdStrike to Cybersecurity Services Portfolio
Cloud Security Cybersecurity Featured Incident Response Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

Dell Adds CrowdStrike to Cybersecurity Services Portfolio

March 15, 2023 Michael Vizard | Mar 15 0

Security Humor

Robert M. Lee's & Jeff Haas' Little Bobby Comic - 'WEEK 422’

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.