Category: Cybersecurity Insiders

Combating Cybercrime in the Age of Remote Work

By Dimitri Shelest, Founder and CEO of OneRep The increase in remote and hybrid work since the COVID-19 pandemic has revolutionized the way that companies operate. It has also introduced a new array of cybersecurity threats. Bad actors have more…

Supply chain attacks demand a 3rd party risk re-think

By Tomislav Pericin, Chief Software Architect at ReversingLabs Looked at from one angle, the recent attack on JumpCloud, a cloud-based identity and access management provider, was unsurprising. The incident, which JumpCloud disclosed in early July, involved a North Korean state-sponsored actor known as Lazarus…

Captcha security to end for Google and Apple users

Anticipated for the past two years, Google and Apple Inc. have officially announced their plans to discontinue the use of annoying Captchas for all their users by the end of this year. Captchas, which stand for “Completely Automated Public Turing…

Curbing Mobile Malware with Zero Trust: Enhancing Mobile Security

Mobile devices have become an integral part of our daily lives, seamlessly integrating into our personal and professional routines. However, this increased reliance on mobile technology has also made these devices prime targets for cybercriminals seeking to exploit vulnerabilities through…

Protecting energy infrastructure from cyberattacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the current geopolitical climate, the energy sector,…

Microsoft and Samsung launch Advanced Mobile Security Solution

Microsoft and Samsung Technology have joined forces to enhance mobile device security for enterprises. This collaboration has resulted in the world’s first mobile hardware-based device attestation, which verifies the identity and integrity of the device. In simpler terms, an attestation…

Effectively managing security budgets in a recession

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  How can you effectively manage a security budget…

Future careers: how to make it in biometrics

A career in biometrics means changing the future. Your work can have a direct positive impact on the lives of individuals and communities worldwide – helping them to access essential services easily, move and travel seamlessly, and be part of…

How to improve employee phishing awareness

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Social engineering has long been a popular tactic…

Cyber Attack news headlines trending on Google

Temu, the Chinese e-commerce platform specializing in clothing and electronic accessories, is currently facing scrutiny from a US watchdog due to concerns regarding privacy and cybersecurity. Despite its recent expansion to Europe and America, the company has encountered significant challenges,…

What is an SSL stripping attack

SSL stripping is a type of cyber-attack that targets the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols, which are used to encrypt and secure data transmission over the internet. The primary purpose of SSL/TLS is to ensure…

How Memcyco Battles Brandjacking with a Multi-Layered Defense

Website impersonation is getting more rampant. A 2021 study found that on average, companies across various industries face nearly 1,100 spoofed domain threats per year. Moreover, Statista research shows that several of the world’s leading ecommerce websites, including Amazon, eBay,…

DdoS attack on 12 Norway government websites

Norway is experiencing serious cyber threat from state funded actors and has become a latest victim to a distributed denial of service attack aka DdoS attack. According to the Norway’s Ministry of Local and Regional Development about 12 of its…

Ransomware news trending on Google

In a recent report by Check Point software technologies, it has been revealed that Microsoft’s AI-based chat platform, ChatGPT, has demonstrated the ability to generate ransomware, in addition to creating SEO-friendly content and codes. This discovery underscores the dual nature…

Topics to study for job in Artificial Intelligence

If you are looking to pursue a job in artificial intelligence (AI), it’s essential to have a solid understanding of various topics that underpin this rapidly evolving field. AI is a multidisciplinary domain that combines principles from computer science, mathematics,…

How social media compromises information security

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Today’s companies operate in a complex security environment.…

ChatGPT, the new rubber duck

Introduction Whether you are new to the world of IT or an experienced developer, you may have heard of the debugging concept of the ‘programmer’s rubber duck’. For the uninitiated, the basic concept is that by speaking to an inanimate…

How to Draft an Effective Data Protection Strategy

In today’s data-intensive world, protecting critical information is paramount for businesses and firms. With cyber threats on the rise, it’s crucial to develop a robust data protection strategy related to cybersecurity that safeguards not only the data you collect and…

Protecting energy infrastructure from cyberattacks

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the current geopolitical climate, the energy sector,…

Kevin Mitnick hacker dies unexpectedly at 59

Kevin Mitnick, a renowned hacker, and computer security consultant died on July 16th of 2023 because of pancreatic cancer. The hacker who was convicted in sensational cases for 5 times in 90s is now no more and left behind a…

Rubrik offers $10m ransomware compensation to victims

In the face of increasingly sophisticated ransomware attacks, businesses worldwide are grappling with the need to safeguard their valuable data. As cybercriminals continue to evolve their methods, organizations must seek innovative solutions to protect their information and provide peace of…

The Crucial Role of Time Stamps in Data Security

In today’s interconnected digital world, data security has become a paramount concern for individuals, organizations, and governments alike. Protecting sensitive information from unauthorized access and ensuring its integrity is of utmost importance. One effective tool that plays a vital role…

Sophos gets startled by Sophos Encrypt Ransomware

Cybersecurity firm Sophos has released a media update that it doesn’t have any association with the newly discovered Sophos Encrypt Ransomware and is busy investigating its whereabouts and inception. A couple of days ago, MalwareHunter Team investigated and disclosed a…

Effectively managing security budgets in a recession

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  How can you effectively manage a security budget…

Cyber Attack news headlines trending on Google

TOMRA, the company that deals with mining and recycling services in Norway was hit by a cyber attack disrupting whole of its systems related to metal sorting, mining machines and food sorting equipment. The company that has an annual turnover…

Ransomware makes two cities declare emergency

In a concerning turn of events, the impact of ransomware attacks has reached such an extent that two cities have been compelled to declare local emergencies due to the crippling effect on their government’s IT infrastructure. Langlade County in Wisconsin…

Facebook steals crimes information from Police Database

Facebook is found accessing information being reported to the Metropolitan Police database and is doing it without the authorization from the law enforcement agencies. This includes info related to se$ual offenses and domestic abuse case sheets and crimes lodged onto…

AI tool WormGPT used to launch Cyber Attacks

According to a recent report by cybersecurity firm SlashNext, a newly developed AI tool called WormGPT is being employed by cybercriminals to launch business email compromise (BEC) attacks. WormGPT operates similarly to Microsoft’s popular conversational AI bot, ChatGPT, but with…

Common ISO/IEC 27001 Pitfalls and How to Avoid Them

By Megan Turner, Technical Specialist of Information Security, NSF-ISR With cyberattacks at an all-time high, it’s necessary for businesses to implement cybersecurity programs and practices. However, many companies either do not know how to improve their information security or their…

ChatGPT, the new rubber duck

Introduction Whether you are new to the world of IT or an experienced developer, you may have heard of the debugging concept of the ‘programmer’s rubber duck’. For the uninitiated, the basic concept is that by speaking to an inanimate…

FTC starts data security probe on ChatGPT OpenAI

The Federal Trade Commission (FTC) has turned its attention towards ChatGPT, the conversational Chatbot developed by OpenAI and now owned by Microsoft, due to concerns regarding data privacy. The data watchdog has requested that the technology company submit a detailed…

Five 5 free online cybersecurity courses

“Introduction to Cybersecurity” by Cisco Networking Academy: This course provides a comprehensive introduction to cybersecurity concepts and best practices. It covers topics such as networking, cryptography, risk management, and more. You can find this course on the Cis-co Networking Academy…

Cyber Attack news headlines trending on Google

Microsoft has hit the news headlines for repelling a cyber attack targeting government servers from Western Europe. The attack is suspected to have launched by hackers from the Chinese nation and was done to siphon confidential information. According to a…

Ransomware attack on Hayward City of California

Networked servers of the City of Hayward, California were hacked by a notorious ransomware gang demanding a double-digit figure in millions, only to be paid in cryptocurrency. Chuck Finnie, the Communications and Marketing Officer of Hayward City stated that the…

Understanding the Distinction: Ethical Hacking vs. Cybersecurity

In today’s digital landscape, the need for robust security measures is paramount. Two terms that often come up in discussions regarding safeguarding digital systems are “ethical hacking” and “cybersecurity.” While both are essential components of protecting sensitive information and preventing…

What is identity and why is it important?

What is identity?  Did you know that identity is actually a mathematical term? It belongs to the scientific theory of social mathematics, which was first studied in the late 18th century by French mathematician and philosopher, Marie Jean Antoine Nicolas…

How social media compromises information security

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Today’s companies operate in a complex security environment.…

Cyber Attack on Australia Ventia

Ventia, an essential service provider to critical infrastructure in Australia and New Zealand was forced to pull down some of its servers that were under the influence of a sophisticated digital attack. Cyber security experts were hired to probed down…

UK Finance company loses £20m to Cyber Criminals

Revolut, a financial firm that is governed by Bank of Lithuania within European Union has apparently lost £20m to the act of cyber criminals who smartly drained the funds from the London based financial service provider. Well, the siphoning of…

What is Tailgating in Cyber World

In the cyber world, “tailgating” refers to a deceptive social engineering technique used by hackers to gain unauthorized access to secure areas or systems. Also known as “piggybacking,” this tactic involves an individual without proper authorization following closely behind an…