Category: Cybersecurity Insiders

Leveraging ChatGPT to Alleviate Stress on Cybersecurity Teams

In today’s fast-paced digital landscape, the role of security teams has become increasingly critical to safeguarding sensitive information and maintaining the integrity of digital infrastructures. However, this responsibility often leads to high stress levels among security professionals. One potential solution…

How to make your phishing campaign a success

Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized…

ProxyNation: The dark nexus between proxy apps and malware

Executive summary AT&T Alien Labs researchers recently discovered a massive campaign of threats delivering a proxy server application to Windows machines. A company is charging for proxy service on traffic that goes through those machines. This is a continuation of research described…

What is post-quantum cryptography and why is it important?

Whether you work in the tech field or not, it’s likely that you’ve increasingly heard of quantum computing.   As with any emerging technology, along with all the possibilities there are also potential risks. We’ll be unpacking these latest developments, what…

Why is API security the next big thing in Cybersecurity?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  APIs, formally known as application programming interfaces, occupy…

Do It for You: Commit to Cybersecurity Certification Now

It goes beyond digital badges and celebratory selfies. CISSP certification holds measurable value. For qualified professionals, a career in cybersecurity leadership allows you to work where life lands you with near limitless possibilities. CISSP certification is a window to your…

DDoS Attacks in a Kubernetes Environment: Detection and Mitigation

By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges for cloud-first enterprises. In a DDoS attack, an application or service becomes unavailable to users due to resources exceeding its…

Britain starts issuing ‘Early Warning’ to Ransomware Victims

The British government has initiated a fresh initiative named the ‘Early Warning’ program, designed to proactively alert potential targets of impending ransomware attacks, offering a preventive measure before the situation escalates. However, the program, supported by the UK’s National Cyber…

4 Major Innovations in Healthcare Smart Cards

As the healthcare industry digitises, security is a growing concern for consumers and businesses alike. Our healthcare data is perhaps the most personal information we have, and every effort needs to be made to keep it secure. There is broad…

BlackCat Ransomware Group targets Seiko Watch Japan

ALPHV Ransomware, also known as the BlackCat Ransomware group, has recently directed their cyber attack towards Seiko, a renowned Japanese watch manufacturer. This attack has caused a certain level of disruption to Seiko’s production operations and has led to the…

Trending cybersecurity news headlines on Google

1.) Tesla Faces Data Breach, Employee Information Compromised Tesla, the prominent electric car manufacturer, recently experienced a concerning data breach, with sensitive information of approximately 75,000 staff members being leaked to a German-language business media outlet called Handelsblatt. An extensive…

Benefits on Information Security Automation

In an era where technology plays an indispensable role in every aspect of our lives, the protection of sensitive information has become a paramount concern. As threats to data security continue to evolve, organizations are seeking innovative ways to safeguard…

GitLab vulnerability leads to Proxyjacking malware Campaign

GitLab, a widely used open source platform designed to facilitate software development, security, and operation, recently fell victim to a cyberattack orchestrated by hackers who exploited a vulnerability within its infrastructure. This breach allowed them to execute proxyjacking and cryptojacking…

Slack outage not caused by Cyber Attack

Slack, the widely used professional communication platform, experienced an outage that affected many users in the western region yesterday. The disruption occurred from 12:06 PM ET to 1:56 PM ET in the afternoon. However, for a subset of users, the…

Edge computing’s role in healthcare

Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984…

Exploring the Essence of Confidential Computing

In the realm of modern computing, the safeguarding of data has become an utmost priority. The rise of cyber threats and data breaches has propelled technology pioneers to seek innovative ways to ensure the privacy and security of sensitive information.…

Mac systems turned into proxy exit nodes by AdLoad

This blog was jointly written by Fernando Martinez Sidera and Ofer Caspi, AT&T Alien Labs threat intelligence researchers. Executive summary  AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been…

Why is API security the next big thing in Cybersecurity?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  APIs, formally known as application programming interfaces, occupy…

Ransomware spreading gangs start Customer Service

In recent times, the landscape of ransomware attacks has evolved, with threat actors altering their strategies. The common practice of encrypting databases and demanding ransoms has given way to a more nuanced approach. As cyber criminals have started adopting a…

Amazon offers $20m to bolster cybersecurity of K-12 schools

Amazon Web Services has committed a substantial sum of $20 million to support President Biden’s initiative aimed at bolstering cybersecurity measures within K-12 schools. The overarching goal of this initiative, emanating from the White House, is to fortify the databases…

Types of Cyber Attacks Every Online User Should Be Aware Of

In today’s digital age, where our lives are intertwined with the virtual world, cybersecurity has become a paramount concern. The online landscape is teeming with threats that can compromise sensitive information, disrupt services, and lead to financial losses. Understanding the…

Edge computing’s role in healthcare

Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984…

What may be lurking behind that QR code

As we go about our daily lives, whether that be shopping with the family, enjoying dinner at a restaurant, finding our gate at the airport, or even watching TV, we find ourselves more and more often encountering the QR code.…

2023 Ransomware Trends

by Avishai Avivi, CISO, SafeBreach  From small attacks to mass hacks, ransomware groups continue to wreak havoc in 2023, attacking organizations of all types, disrupting operations, and exacting high payouts. In March, not only did the White House declare ransomware…

Google Cloud launched Chronicle Cybershield

Amid the growing challenges posed by advanced cyber threats, Google Cloud has introduced “Chronicle Cybershield,” a solution aimed at bolstering the cybersecurity capabilities of government agencies worldwide. This innovative offering is designed to aid governments in enhancing their ability to…

Connecticut school loses millions in Spoofing Cyber Attack

A sophisticated cyber attack orchestrated by unidentified cyber criminals has resulted in the unlawful acquisition of $6 million from a Connecticut-based school. The New Haven Public Schools fell victim to this cyber assault, with an ongoing forensic investigation still in…

Ensuring HIPAA Compliance on Mobile Devices: A Vital Guide

In today’s digital age, where mobile devices have become an integral part of healthcare delivery and patient management, maintaining the highest standards of data security and privacy is of paramount importance. The Health Insurance Portability and Accountability Act (HIPAA) sets…

Mac systems turned into proxy exit nodes by AdLoad

This blog was jointly written by Fernando Martinez Sidera and Ofer Caspi, AT&T Alien Labs threat intelligence researchers. Executive summary  AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been…

Zoom using user data to train its AI models

Zoom, the widely used video conferencing application prominent in corporate circles, has made a public announcement concerning its intention to employ user data for the training of its Artificial Intelligence (AI) models. Noteworthy updates to the regulations associated with this…

Fortifying Defences: Cybersecurity in the Dawn of AI

By Daniel Hofmann, CEO of Hornetsecurity Large Language Models (LLM) and Generative AI technologies like ChatGPT, have brought significant benefits to businesses. However, the potential for misuse and accidental data exposure can lead to high costs for organisations. Recent incidents,…

Bolstering Cloud Security Through Serverless Architecture

In the ever-evolving landscape of cloud technology, security remains a paramount concern. As businesses increasingly migrate their operations to the cloud, the need for robust security measures becomes more critical than ever. Serverless architecture, a paradigm shift in cloud computing,…

Edge computing’s role in healthcare

Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984…

What may be lurking behind that QR code

As we go about our daily lives, whether that be shopping with the family, enjoying dinner at a restaurant, finding our gate at the airport, or even watching TV, we find ourselves more and more often encountering the QR code.…

CLOP Ransomware avoids takedowns by using torrents

Clop Ransomware, a notorious cybercriminal gang based in the United States, has recently changed its tactics to evade law enforcement surveillance. Instead of using traditional websites to sell stolen data, the gang has adopted a new strategy of leaking data…

Honeypots in Cybersecurity: A Deceptive Defense

In the ever-evolving landscape of cybersecurity, staying one step ahead of malicious actors is critical. One innovative technique gaining popularity among cybersecurity professionals is the use of “honeypots.” Honeypots are decoy systems or network resources designed to deceive cyber attackers,…

How to protect mobile phone from malware attacks

The proliferation of smartphones has led to a significant increase in malware attacks on mobile devices. To safeguard your smartphone from these malicious software threats, it is crucial to implement some protective measures. Here are some essential tips to fortify…

Citrix servers hacked because of a vulnerability

Several cyber criminals recently targeted Citrix NetScaler ADC and Gateway Servers through a vulnerability identified as CVE-2023-3519, which holds a high CVSS score of 9.8. The flaw allowed for remote code injection, potentially leading to unauthorized access. The breach was…

Key Concepts in Cloud Security for Beginners

Cloud computing has revolutionized the way businesses operate by offering scalable, flexible, and cost-effective solutions. However, as data and applications migrate to the cloud, ensuring their security becomes paramount. For beginners in cloud security, understanding the key concepts is crucial…

How to improve employee phishing awareness

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Social engineering has long been a popular tactic…

Protecting energy infrastructure from cyberattacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the current geopolitical climate, the energy sector,…

Hackers using Flipper Zero to Cyber Attack Power Grids

Ever imagined a small online device capable of hacking into power grid control systems? Well, cybercriminals are already exploiting the power of the ‘Flipper Zero,’ a device priced at $168, to gain unauthorized access to various systems, including garage doors,…