Category: Cybersecurity Insiders

Details of Airbus Cyber Attack and Implications

Airbus, a renowned leader in the aerospace industry, has recently found itself at the center of a highly sophisticated cyber-attack, sending shockwaves through the cybersecurity landscape. This breach has exposed a trove of sensitive information, including the personal details of…

Future forward cyber

For organizations of all sizes, cyber consistently earns a place on the agenda, becoming a focal point for business-critical initiatives and investments. Today, cyber means business, and it isn’t challenging to overstate the importance of cyber as a foundational and…

China’s Move Towards Automated Data Security Compliance

In an era marked by persistent insider threats, espionage activities, malicious software attacks, and escalating cyberwarfare, China is contemplating a gradual shift towards replacing human oversight with cutting-edge technology to enforce critical data security regulations. Under the banner of national…

Dangers of Deep Sea Phishing

By Michael Angelo Zummo, Threat Intel Expert – CybersixgillPhishing tools and services are common and accessible on the underground. We took a close look at one of them and discovered how easy it can be to launch a phishing scheme.…

Industry Experts React to DARPA’s AI Cyber Challenge

At Black Hat USA 2023, the Department of Defense (DoD) Defense Advanced Research Projects Agency (DARPA) unveiled a two-year “AI Cyber Challenge” (AIxCC) competition aimed at driving innovation in AI and the creation of new cybersecurity tools. The competition will…

Cyber Attack on MGM Hotel Group

MGM Resorts has officially announced an ongoing investigation into a cybersecurity incident that has severely impacted various aspects of its operations, including company emails, reservation records, room access systems, and even casino slot machines. Law enforcement agencies have been contacted…

Tenable to acquire Ermetic for $265 million

Tenable Inc., the cybersecurity company headquartered in Maryland, has officially revealed its plans to acquire the Israel-based Cloud Security Startup, Ermetic. Although the exact financial terms of the deal have not been disclosed, reliable sources have indicated that the acquisition…

Top blockchain Cybersecurity threats to watch out for

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Approximately 57 cryptocurrency thefts occurred in just the first…

Ransomware targets over 5000 government email addresses

The Sri Lankan Government has recently reported a significant data loss incident involving over 5000 email accounts spanning from May to August 2023. The primary cause of this data loss was identified as a cyber attack, specifically a ransomware variant.…

Killware vs. Ransomware: Key Differences

In the realm of cybersecurity threats, the terms “Killware” and “Ransomware” often surface in discussions. While both are malicious software designed to disrupt computer systems, they serve distinct purposes and operate in different ways. This article delves into the concepts…

Biometrics in law enforcement

How biometrics can help to make our world a safer place We’ve recently been exploring biometric technologies on this blog and how they have become a part of our everyday lives, helping us to move, travel and pay more seamlessly.…

Concerns Over Cyber Attacks Growing Among UK Schools

As the new term approaches, schools across the United Kingdom are grappling with a rising threat – cyberattacks. Many institutions, whether they are gearing up to open their doors or have already commenced preparations, are finding it increasingly challenging to…

How to Achieve Maximum Security in Virtualized Data Centers

Virtualized data centers have become the backbone of modern IT infrastructure, offering scalability, efficiency, and cost-effectiveness. However, as data center virtualization continues to grow, ensuring utmost security has become paramount. This article explores strategies and best practices for achieving maximum…

Mobile threat defense or bust

The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile…

Battling malware in the industrial supply chain

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Here’s how organizations can eliminate content-based malware in…

Biden’s IoT Cybersecurity initiative

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The Biden Administration has recently announced the implementation…

Cyber Threats Emerging from Text Message Spam and Smishing

In today’s digital age, where smartphones have become an integral part of our lives, cyber threats are constantly evolving. While email spam and phishing attacks are widely recognized, a newer threat has been gaining prominence: text message spam, often referred…

Top 5 Cybersecurity Concerns with 5G

Amid the growing interest from both companies and governments in transitioning to the cutting-edge fifth generation of wireless networks, commonly known as 5G, security experts are sounding the alarm about the challenges that come with securing this dynamic and complex…

Introducing the next phase of 5G

It’s been over four years since 5G was introduced and the technology has now been rolled out across all the world’s major economies. So, we’re starting to think about what’s coming next…. Expansion into emerging markets With 5G already embedded…

Future forward cyber

For organizations of all sizes, cyber consistently earns a place on the agenda, becoming a focal point for business-critical initiatives and investments. Today, cyber means business, and it isn’t challenging to overstate the importance of cyber as a foundational and…

How malware sandboxes can help strengthen cybersecurity

In the ever-evolving landscape of cybersecurity, the battle between cyber-criminals and defenders rages on. Cyberattacks are becoming more sophisticated and harder to detect, making it imperative for organizations to bolster their defenses. One powerful weapon in the cybersecurity arsenal is…

Germany witnesses $224Bn yearly economy loss with Cyber Attacks

In recent times, many developed nations such as the United States, the United Kingdom, Canada, and Australia have refrained from publicly identifying their cyber adversaries, understanding that doing so might inadvertently provide these adversaries with a significant advantage on the…

Anonymous Sudan launched Cyber Attack on X formerly Twitter

In a digital age where the lines between activism and hacking are increasingly blurred, Anonymous Sudan, a self-proclaimed hacktivist group with ties to the Russian Federation, recently launched a cyber-attack on the servers of the social media giant formerly known…

How to obtain cyber resilience in low security budgets

In the contemporary digital environment, the specter of cyberattacks casts a shadow over organizations of every scale. Despite the essential role that cyber resilience plays in protecting sensitive information and ensuring seamless business operations, numerous enterprises, particularly those operating within…

Battling malware in the industrial supply chain

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Here’s how organizations can eliminate content-based malware in…

Mobile threat defense or bust

The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile…

Deploying AI Code: Safety Goggles Needed

Pieter Adieux Co-Founder and CEO, Secure Code Warrior The possibilities of generative AI (GAI) technology have had both developers and non-developers wide-eyed with excitement, particularly around automation, productivity and business development. What makes it so engaging is that it’s clearly…

Assessing Generative AI’s Impact on Cyber Risk

By David Hoelzer, Fellow at The SANS Institute The rise of ChatGPT and generative AI has ushered in an extensive range of new opportunities seemingly overnight. With the ability to automate a plethora of capabilities, the tool has garnered the…

LockBit Ransomware targets a province in Quebec Canada

The historical Municipality of Montreal, situated in Canada, has fallen victim to the LockBit Ransomware, an event that underscores the increasing menace of cyber threats. This century-old establishment faced a critical juncture as it chose not to comply with the…

Barracuda Email Hack leaks government emails in America

China has reportedly focused its efforts on compromising email servers within several American government networks, raising concerns about potential data exploitation. According to findings from Mandiant, a state-sponsored criminal group targeted the Barracuda Email Security Gateway (ESG) between October and…

No More Band-Aids: It’s Time for IT and OT Security Convergence

By Sreenivas Gukal, Head of Products, VP of Engineering, and Co-Founder at Acalvio Technologies Enterprises and regulated industries are becoming well aware that their risk management strategy must include cybersecurity for OT (Operational Technology) environments and the convergence of IT…

The Latest in Cybersecurity Incidents making to Google Headlines

Collaborative Efforts Dismantle Qakbot Malware’s IT Infrastructure In a significant joint operation, the FBI, in partnership with the Department of Justice and international allies, has successfully taken down the IT infrastructure owned by the Qakbot Malware group. Drawing expertise from…

Decoding the Naming Conventions of Ransomware Malware

In the ever-evolving landscape of cyber threats, one form of digital menace has gained significant notoriety: ransomware malware. These malicious programs encrypt victims’ data and demand a ransom for its release, wreaking havoc on individuals, businesses, and even government institutions.…

Criminals hack radio commands to stop Poland Trains

Over the past 48 hours, media outlets have been abuzz with reports of Russian cyber-attacks targeting government websites. However, what remains shrouded in relative obscurity is a puzzling incident involving more than 20 passenger trains being abruptly immobilized, sparking public…

Rackspace spends $10m in ransomware cleanup costs

In November of the previous year, Rackspace, a well-known company providing cloud computing services, fell victim to a cyber-attack orchestrated by the Play Ransomware group. This attack led to a disruption in their email exchange services for a duration of…

ProxyNation: The dark nexus between proxy apps and malware

Executive summary AT&T Alien Labs researchers recently discovered a massive campaign of threats delivering a proxy server application to Windows machines. A company is charging for proxy service on traffic that goes through those machines. This is a continuation of research described…

AI-Powered SOC Automation: A New Era in Security Operations

Security Operations Centers (SOCs) are the heart of cybersecurity, but managing the endless stream of alerts, conducting in-depth investigations, and timely response to incidents are challenges that overwhelm even the most robust SOCs. The core of this problem is the…

API Breaches Are Rising: To Secure the Future, We Need to Learn from the Past

By Richard Bird, Chief Security Officer at Traceable In the ever-evolving landscape of cybersecurity, it’s concerning to witness a persistent rise in breaches. The underlying issue? The consistent sidelining of API security. Despite the transformative role APIs play in modern digital infrastructures, they remain an underestimated component in many security strategies. This oversight isn’t merely…

What is Software Asset Management? And why you should care

By Karen Lambrechts, Lansweeper So much software, so little oversight! That may be how many IT departments are feeling lately. According to MarketsAndMarkets, the global Software Asset Management (SAM) market size is expected to grow at a Compound Annual Growth…

Biden’s IoT Cybersecurity initiative

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The Biden Administration has recently announced the implementation…

Cyber Attack blame to UK Airspace Chaos

Over the last several hours, the air traffic situation in Britain has plunged into a state of turmoil, prompting some segments of the media to attribute the crisis to a cyber-attack. Indeed, the reports you’ve come across are accurate. Nevertheless,…

Data Breach of London Metropolitan Police turns serious

London Metropolitan Police has made headlines due to a sophisticated cyber attack that resulted in a significant data breach. Upon delving into the specifics, the agency fell victim to hackers who successfully breached the database of a third-party contractor responsible…

Best Practices to safeguard Data Across Hybrid Cloud Environments

In today’s digital world, businesses are increasingly adopting hybrid cloud solutions to harness the benefits of both public and private cloud infrastructures. While hybrid cloud offers unprecedented flexibility and scalability, it also introduces complex challenges in securing sensitive data across…

Social media companies to stop data scraping

Any marketing company or team operating worldwide typically shares a common practice: extracting data from social media platforms and utilizing this information for digital marketing endeavors. Similarly, certain online marketing firms provide data scraping tools to premium users, enabling them…

Password Protection in the Era of AI-Based Attacks

By Craig Lurey, CTO and Co-Founder, Keeper Security As Artificial Intelligence–better known as AI–proves to be a revolutionary technology that is already leaving an indelible mark on many aspects of our lives, criminals are actively seeking ways to use that same…

Mobile threat defense or bust

The case for unified endpoint management and mobile threat defense The evolution of endpoint management Unified endpoint management (UEM) has played a significant role over the years in enabling companies to improve the productivity and security of their corporate mobile…

Personal Data Privacy: Trends, Challenges, and Solutions

In an increasingly interconnected world, personal data privacy has become a growing concern that resonates with virtually every individual and organization. One company aiming to solve the data privacy challenge is OneRep, a firm focused on privacy and personal information…