In today’s fast-paced digital landscape, the role of security teams has become increasingly critical to safeguarding sensitive information and maintaining the integrity of digital infrastructures. However, this responsibility often leads to high stress levels among security professionals. One potential solution…
Category: Cybersecurity Insiders
How to make your phishing campaign a success
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized…
Get the AT&T Cybersecurity Insights Report: Focus on US SLED
We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report™: Focus on State and Local government and higher Education in the United States (US SLED). It looks at the edge ecosystem, surveying US SLED leaders, and provides…
ProxyNation: The dark nexus between proxy apps and malware
Executive summary AT&T Alien Labs researchers recently discovered a massive campaign of threats delivering a proxy server application to Windows machines. A company is charging for proxy service on traffic that goes through those machines. This is a continuation of research described…
How ChatGPT and Large Language Models Can Impact the Future of Cybersecurity
By Karthik Krishnan, CEO, Concentric AI Artificial intelligence (AI) has achieved remarkable advancements over the past few years, with examples such as ChatGPT dominating recent headlines. Similarly, large language models (LLMs) are emerging as a game-changing innovation. LLMs like GPT…
What is post-quantum cryptography and why is it important?
Whether you work in the tech field or not, it’s likely that you’ve increasingly heard of quantum computing. As with any emerging technology, along with all the possibilities there are also potential risks. We’ll be unpacking these latest developments, what…
Leveraging AT&T Cybersecurity Consulting for a robust Zero Trust Center of Excellence
As cybersecurity becomes increasingly complex, having a centralized team of experts driving continuous innovation and improvement in their Zero Trust journey is invaluable. A Zero Trust Center of Excellence (CoE) can serve as the hub of expertise, driving the organization’s…
Why is API security the next big thing in Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. APIs, formally known as application programming interfaces, occupy…
Do It for You: Commit to Cybersecurity Certification Now
It goes beyond digital badges and celebratory selfies. CISSP certification holds measurable value. For qualified professionals, a career in cybersecurity leadership allows you to work where life lands you with near limitless possibilities. CISSP certification is a window to your…
Application Security From Code to Cloud – An Interview with Lotem Guy at Cycode
In a recent interview with Lotem Guy, VP of Product at Cycode, providing an innovative Application Security Posture Management (ASPM) platform for code to cloud, we discussed the rapidly evolving landscape of application security. In recent years, application security has…
Cyber Attacks that impacted billions and millions of online accounts
In recent times, our focus has been on reporting the aftermath of cyber attacks and the challenges faced by their victims. In this article, we will shift our attention to the cyber attacks that have left a significant impact on…
DDoS Attacks in a Kubernetes Environment: Detection and Mitigation
By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges for cloud-first enterprises. In a DDoS attack, an application or service becomes unavailable to users due to resources exceeding its…
Training the Next Generation of Cybersecurity Professionals: 4 Keys to a Successful Internship Program
By Ariel Weintraub, Head of Enterprise Cyber Security, MassMutual More than three million cybersecurity professionals are needed across the globe to meet threat demands, according to the (ISC)² 2022 Cybersecurity Workforce Study, and equipping the next generation with the skills…
Britain starts issuing ‘Early Warning’ to Ransomware Victims
The British government has initiated a fresh initiative named the ‘Early Warning’ program, designed to proactively alert potential targets of impending ransomware attacks, offering a preventive measure before the situation escalates. However, the program, supported by the UK’s National Cyber…
4 Major Innovations in Healthcare Smart Cards
As the healthcare industry digitises, security is a growing concern for consumers and businesses alike. Our healthcare data is perhaps the most personal information we have, and every effort needs to be made to keep it secure. There is broad…
AT&T Cybersecurity wins SC Media Award for Best Threat Intelligence
Today, SC Media announced the winners of its annual cybersecurity awards for excellence and achievements. At AT&T Cybersecurity we are thrilled that AT&T Alien Labs was awarded Best Threat Intelligence in this prestigious competition. The Alien Labs team works closely…
Building Cybersecurity into the supply chain is essential as threats mount
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The supply chain, already fragile in the USA,…
Volatility Workbench: Empowering memory forensics investigations
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Memory forensics plays a crucial role in digital…
BlackCat Ransomware Group targets Seiko Watch Japan
ALPHV Ransomware, also known as the BlackCat Ransomware group, has recently directed their cyber attack towards Seiko, a renowned Japanese watch manufacturer. This attack has caused a certain level of disruption to Seiko’s production operations and has led to the…
Trending cybersecurity news headlines on Google
1.) Tesla Faces Data Breach, Employee Information Compromised Tesla, the prominent electric car manufacturer, recently experienced a concerning data breach, with sensitive information of approximately 75,000 staff members being leaked to a German-language business media outlet called Handelsblatt. An extensive…
Benefits on Information Security Automation
In an era where technology plays an indispensable role in every aspect of our lives, the protection of sensitive information has become a paramount concern. As threats to data security continue to evolve, organizations are seeking innovative ways to safeguard…
Cyber Security & Cloud Expo Europe 2023 – Less Than Two Months To Go
Save the date and get ready for one of the most anticipated events in the tech and cyber community – Cyber Security & Cloud Expo Europe! This year’s expo will take place on 26-27 September at the renowned RAI Amsterdam, bringing together…
Stories from the SOC – Unveiling the stealthy tactics of Aukill malware
Executive summary On April 21st, 2023, AT&T Managed Extended Detection and Response (MXDR) investigated an attempted ransomware attack on one of our clients, a home improvement business. The investigation revealed the attacker used AuKill malware on the client’s print server to…
Image steganography: Concealing secrets within pixels
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of information security and covert…
GitLab vulnerability leads to Proxyjacking malware Campaign
GitLab, a widely used open source platform designed to facilitate software development, security, and operation, recently fell victim to a cyberattack orchestrated by hackers who exploited a vulnerability within its infrastructure. This breach allowed them to execute proxyjacking and cryptojacking…
Slack outage not caused by Cyber Attack
Slack, the widely used professional communication platform, experienced an outage that affected many users in the western region yesterday. The disruption occurred from 12:06 PM ET to 1:56 PM ET in the afternoon. However, for a subset of users, the…
Vulnerability Comparison: Android vs. iOS in the Face of Cyber Attacks
In the digital age, where smartphones have become an inseparable part of our lives, concerns about cybersecurity have risen to the forefront. Two major players in the smartphone market, Android, and iOS, stand out due to their extensive user base…
Adaptive Shield Unveils Identity Threat Detection and Response (ITDR): A New Era in SaaS Security
Adaptive Shield, a leader in SaaS security, has made headlines with the announcement of its groundbreaking Identity Threat Detection and Response (ITDR) solution at Black Hat USA 2023. This new addition to its SaaS Security Posture Management (SSPM) solution marks…
Securing your cloud networks: Strategies for a resilient infrastructure
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. What exactly is resilience? According to the U.S.…
Edge computing’s role in healthcare
Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984…
List of countries that issued TikTok ban due to data security concerns and benefits
The concerns raised by the United States regarding the use of TikTok on government-owned devices led to restrictions on its usage during the Trump administration. However, under President Joe Biden’s leadership, a comprehensive ban was implemented on the video messaging…
Why you need to protect your smartphone with mobile security software
In the modern era, smartphones have transitioned from being mere luxuries to absolute necessities. They serve as lifelines for maintaining connections with loved ones, facilitating payments, and accessing work-related content from virtually anywhere at any time. Upon acquiring a new…
Protecting Your Business from Email Compromise: Essential Security Measures
Grant Warkins, Director, Technical Advisor Services, MOXFIVE In today’s digital landscape, businesses face an ever-increasing risk of email compromise, which can lead to significant financial losses due to fraud and reputational damage to customers. Safeguarding your organization’s email assets is crucial…
Continuous Security Testing Is The Key To Strengthening Your Cybersecurity
If you’re only conducting snapshot in time security tests, you aren’t doing enough to protect your business. By Erik Holmes, CEO, Cyber Guards I’ve helped develop cybersecurity strategies for numerous companies over the past two decades. There’s a standard line…
LinkedIn account hacks increased in the past couple of weeks
LinkedIn users are advised to prioritize enhancing the security of their accounts, given recent incidents in which several individuals in the tech community have experienced unauthorized access by hackers over the past two months. Hackers are showing no restraint in…
How social media scams are draining bank accounts of victims
From time to time, we encounter social media posts that tempt us to click on a link promising heavily discounted goods or a chance to win a lottery. Some individuals avoid such links, believing themselves to be too savvy to…
Exploring the Essence of Confidential Computing
In the realm of modern computing, the safeguarding of data has become an utmost priority. The rise of cyber threats and data breaches has propelled technology pioneers to seek innovative ways to ensure the privacy and security of sensitive information.…
Get the AT&T Cybersecurity Insights Report: Focus on US SLED
We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report™: Focus on State and Local government and higher Education in the United States (US SLED). It looks at the edge ecosystem, surveying US SLED leaders, and provides…
Mac systems turned into proxy exit nodes by AdLoad
This blog was jointly written by Fernando Martinez Sidera and Ofer Caspi, AT&T Alien Labs threat intelligence researchers. Executive summary AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been…
Why is API security the next big thing in Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. APIs, formally known as application programming interfaces, occupy…
Mind the (Interpretation) gap: Another reason why threat modeling is important
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Where do vulnerabilities fit with respect to security…
Tesla internet connected cars to be banned in China for Data Security concerns
Tesla vehicle owners in China are facing a concerning situation as the looming ban on foreign electric vehicles from the company comes into effect. The issue ignited when an airport in a prominent southern city enacted a ban on parking…
Ransomware spreading gangs start Customer Service
In recent times, the landscape of ransomware attacks has evolved, with threat actors altering their strategies. The common practice of encrypting databases and demanding ransoms has given way to a more nuanced approach. As cyber criminals have started adopting a…
What Is Global Privacy Control (GPC), and how can it help you protect your data?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. More than 67% of internet users in the…
Building Cybersecurity into the supply chain is essential as threats mount
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The supply chain, already fragile in the USA,…
Amazon offers $20m to bolster cybersecurity of K-12 schools
Amazon Web Services has committed a substantial sum of $20 million to support President Biden’s initiative aimed at bolstering cybersecurity measures within K-12 schools. The overarching goal of this initiative, emanating from the White House, is to fortify the databases…
Types of Cyber Attacks Every Online User Should Be Aware Of
In today’s digital age, where our lives are intertwined with the virtual world, cybersecurity has become a paramount concern. The online landscape is teeming with threats that can compromise sensitive information, disrupt services, and lead to financial losses. Understanding the…
Now electric charging stations are vulnerable to hackers after public USB charging points
In recent times, much attention has been given to the potential risks of charging our smartphones from public USB ports found in places like airports, cafes, and rail transit stations. However, a fresh wave of warnings is now emanating from…
Edge computing’s role in healthcare
Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984…
Code Mirage: How cyber criminals harness AI-hallucinated code for malicious machinations
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction: The landscape of cybercrime continues to evolve,…
The impact of blockchain technology on the future of shipping and logistics
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Photo by Tom Fisk Many industries are experiencing…
Encryptionless Ransomware Attacks and Defense Strategies: An Interview with Zscaler’s Deepen Desai
In a recent interview with Deepen Desai, Global CISO and Head of Security Research at Zscaler, we discussed the evolving threat landscape and the company’s innovative approach to combating the ever-growing threat of ransomware. Traditional ransomware attacks primarily focused on…
Encryptionless Ransomware Attacks and Defense Strategies: An Interview with Zscaler’s Deepen Desai
In a recent interview with Deepen Desai, Global CISO and Head of Security Research at Zscaler, we discussed the evolving threat landscape and the company’s innovative approach to combating the ever-growing threat of ransomware. Traditional ransomware attacks primarily focused on…
What may be lurking behind that QR code
As we go about our daily lives, whether that be shopping with the family, enjoying dinner at a restaurant, finding our gate at the airport, or even watching TV, we find ourselves more and more often encountering the QR code.…
Ransomware in 2023: Emerging Threats, New Targets, and How Organizations Can Protect Themselves
by Avishai Avivi, CISO, SafeBreach From small attacks to mass hacks, ransomware groups continue to wreak havoc in 2023, attacking organizations of all types, disrupting operations, and exacting high payouts. In March, not only did the White House declare ransomware…
2023 Ransomware Trends
by Avishai Avivi, CISO, SafeBreach From small attacks to mass hacks, ransomware groups continue to wreak havoc in 2023, attacking organizations of all types, disrupting operations, and exacting high payouts. In March, not only did the White House declare ransomware…
Image steganography: Concealing secrets within pixels
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of information security and covert…
Google Cloud launched Chronicle Cybershield
Amid the growing challenges posed by advanced cyber threats, Google Cloud has introduced “Chronicle Cybershield,” a solution aimed at bolstering the cybersecurity capabilities of government agencies worldwide. This innovative offering is designed to aid governments in enhancing their ability to…
Connecticut school loses millions in Spoofing Cyber Attack
A sophisticated cyber attack orchestrated by unidentified cyber criminals has resulted in the unlawful acquisition of $6 million from a Connecticut-based school. The New Haven Public Schools fell victim to this cyber assault, with an ongoing forensic investigation still in…
Ensuring HIPAA Compliance on Mobile Devices: A Vital Guide
In today’s digital age, where mobile devices have become an integral part of healthcare delivery and patient management, maintaining the highest standards of data security and privacy is of paramount importance. The Health Insurance Portability and Accountability Act (HIPAA) sets…
Reshaping the API Security Landscape: Graylog Acquires Resurface
In the world of cybersecurity, change is the only constant. This reality is once again affirmed in a recent interview with Andy Grolnick, the CEO of Graylog, a leading SIEM and log management solutions provider, who has shared some exciting…
The Future of Cloud-Native Data Security: A Look at Laminar’s New Capabilities
Recently, we sat down with Andy Smith, Chief Marketing Officer at Laminar, a leading agile data security platform provider, for an in-depth discussion on the current landscape of data security in the cloud and how Laminar is forging new paths…
Mac systems turned into proxy exit nodes by AdLoad
This blog was jointly written by Fernando Martinez Sidera and Ofer Caspi, AT&T Alien Labs threat intelligence researchers. Executive summary AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been…
Top 15 Data Security Posture Management (DSPM) platforms for 2023
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Data Security Posture Management (DSPM) plays a critical…
Zoom using user data to train its AI models
Zoom, the widely used video conferencing application prominent in corporate circles, has made a public announcement concerning its intention to employ user data for the training of its Artificial Intelligence (AI) models. Noteworthy updates to the regulations associated with this…
Norway first to put daily penalty on Meta over data security concerns
Norway’s data protection authority, Datatilsynet, has revealed that it is imposing a daily fine of $100,000 on Meta, the parent company of Facebook, due to its unauthorized use of users’ personal information for marketing purposes. This action has been taken…
Mind the (Interpretation) gap: Another reason why threat modeling is important
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Where do vulnerabilities fit with respect to security…
RAM dump: Understanding its importance and the process
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of digital forensics and incident…
What Is Global Privacy Control (GPC), and how can it help you protect your data?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. More than 67% of internet users in the…
Fortifying Defences: Cybersecurity in the Dawn of AI
By Daniel Hofmann, CEO of Hornetsecurity Large Language Models (LLM) and Generative AI technologies like ChatGPT, have brought significant benefits to businesses. However, the potential for misuse and accidental data exposure can lead to high costs for organisations. Recent incidents,…
Rising Threat of ‘Hackers for Hire’ – How End-to-End Encryption Software Safeguards Businesses
By Istvan Lam, CEO of Tresorit According to a new report from the UK’s cyber security agency, the National Cyber Security Centre (NCSC), the number of ‘hackers for hire’ is set to grow over the next five years, leading to…
India to replace all its defense related Microsoft systems with Maya OS due to Ransomware
As the frequency of ransomware attacks targeting Indian defense digital infrastructure continues to rise, the administration under the leadership of Prime Minister Shri Narendra Modi has taken a decisive step. The government has chosen to replace all Microsoft systems with…
Sweet Security Lands $12 Million in Seed Funding to Shift Cloud Security Right with Runtime Security Suite
TEL AVIV, Israel, August 9, 2023: Sweet Security today announced $12 million in seed funding and the launch of its Cloud Runtime Security Suite. The round was led by Glilot Capital Partners with participation from CyberArk Ventures and angel investors…
US holds first ever cybersecurity summit on ransomware attacks on K12 Schools
After observing a series of ransomware attacks targeting K-12 schools, the United States government convened its inaugural cybersecurity summit on August 8th, 2023, in a concerted effort to mitigate these attacks that have resulted in the compromise of sensitive information…
Bolstering Cloud Security Through Serverless Architecture
In the ever-evolving landscape of cloud technology, security remains a paramount concern. As businesses increasingly migrate their operations to the cloud, the need for robust security measures becomes more critical than ever. Serverless architecture, a paradigm shift in cloud computing,…
Edge computing’s role in healthcare
Black Hat 2023 is in full swing. Check out this new episode of ITSecurityGuyTV on cybersecurity and healthcare. AT&T’s head of evangelism, Theresa Lanowitz, visits with ITSecurityGuyTV, Charlie Harold, in this new episode on edge computing’s role in healthcare. 2984…
Mobile Device Management: Securing the modern workplace
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. More mobile devices, more problems. The business landscape…
The impact of blockchain technology on the future of shipping and logistics
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Photo by Tom Fisk Many industries are experiencing…
Code Mirage: How cyber criminals harness AI-hallucinated code for malicious machinations
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction: The landscape of cybercrime continues to evolve,…
Cyber Attack on UK Electoral Database leaks 8 yrs voters information
A significant breach has come to light, as cyber threat actors managed to infiltrate a trove of valuable electoral commission data spanning an impressive eight-year period from 2014 to 2022. The disclosure of this breach has recently been made by…
Exploitation of Artificial Intelligence AI technology to facilitate password theft
In recent times, hackers have traditionally targeted databases to initiate cyber attacks, aiming to pilfer critical credentials like account passwords. However, a recent study proposes a new angle: the exploitation of Artificial Intelligence (AI) technology to facilitate password theft. A…
What may be lurking behind that QR code
As we go about our daily lives, whether that be shopping with the family, enjoying dinner at a restaurant, finding our gate at the airport, or even watching TV, we find ourselves more and more often encountering the QR code.…
CLOP Ransomware avoids takedowns by using torrents
Clop Ransomware, a notorious cybercriminal gang based in the United States, has recently changed its tactics to evade law enforcement surveillance. Instead of using traditional websites to sell stolen data, the gang has adopted a new strategy of leaking data…
Advancing API Security: An Interview with Richard Bird of Traceable AI
By Holger Schulze, Cybersecurity Insiders As the proliferation of APIs continues unabated, the importance of robust API security measures cannot be overstated. In a recent interview, Richard Bird, Chief Security Officer at Traceable AI, offered valuable insights into the increasing…
Honeypots in Cybersecurity: A Deceptive Defense
In the ever-evolving landscape of cybersecurity, staying one step ahead of malicious actors is critical. One innovative technique gaining popularity among cybersecurity professionals is the use of “honeypots.” Honeypots are decoy systems or network resources designed to deceive cyber attackers,…
Ransomware attack targets 3 hospitals in the United States
Last week, three hospitals affiliated with Prospect Medical Holdings, situated in different states across the United States, fell victim to a cyber attack, believed to be a ransomware variant. The attack occurred on Wednesday and was discovered in the early…
Don’t Shut Off ChatGPT, Implement a Managed Allowance Instead
By James Robinson, Deputy CISO Netskope Over the past 30 days, the most pressing question facing CIOs and CISOs right now is, ”how much?” How much access to ChatGPT do we actually give our employees? Top security leaders are left…
Artificial Intelligence Governance Professional Certification – AIGP
For anyone who follows industry trends and related news I am certain you have been absolutely inundated by the torrent of articles and headlines about ChatGPT, Google’s Bard, and AI in general. Let me apologize up front for adding yet…
Top 15 Data Security Posture Management (DSPM) platforms for 2023
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Data Security Posture Management (DSPM) plays a critical…
What your peers want to know before buying a DLP tool
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Preventing data loss is a concern for almost…
How to protect mobile phone from malware attacks
The proliferation of smartphones has led to a significant increase in malware attacks on mobile devices. To safeguard your smartphone from these malicious software threats, it is crucial to implement some protective measures. Here are some essential tips to fortify…
Citrix servers hacked because of a vulnerability
Several cyber criminals recently targeted Citrix NetScaler ADC and Gateway Servers through a vulnerability identified as CVE-2023-3519, which holds a high CVSS score of 9.8. The flaw allowed for remote code injection, potentially leading to unauthorized access. The breach was…
Key Concepts in Cloud Security for Beginners
Cloud computing has revolutionized the way businesses operate by offering scalable, flexible, and cost-effective solutions. However, as data and applications migrate to the cloud, ensuring their security becomes paramount. For beginners in cloud security, understanding the key concepts is crucial…
How to improve employee phishing awareness
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Social engineering has long been a popular tactic…
What Is Global Privacy Control (GPC), and how can it help you protect your data?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. More than 67% of internet users in the…
Protecting energy infrastructure from cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the current geopolitical climate, the energy sector,…
Hackers using Flipper Zero to Cyber Attack Power Grids
Ever imagined a small online device capable of hacking into power grid control systems? Well, cybercriminals are already exploiting the power of the ‘Flipper Zero,’ a device priced at $168, to gain unauthorized access to various systems, including garage doors,…
Empowering the User: An Interview with Guy Guzner on SAVVY’s User-Centric Security Solution
The Human Factor in Cybersecurity In cybersecurity, the user is often considered the weakest link in the security chain. This weakness stems from the myriad of potential mistakes users can make while navigating the increasingly digital and interconnected workplace. Guy…
Cisco Introduces Automated Ransomware Recovery Solution for Enhanced Cybersecurity
In recent times, the rising threat of ransomware attacks has caused significant financial losses and severe disruptions to businesses. As companies struggle to recover from ransom payments, data recovery, and reputational damage, the need for effective solutions has become more…
Ransomware business model-What is it and how to break it?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The threat of ransomware attacks continues to strike…