By Zachary Folk, Camelot Secure In cybersecurity, the threat landscape is becoming more complex daily. For example, Cybersecurity Ventures expects global cybercrime costs to grow by 15 percent annually over the next five years, reaching USD 10.5 trillion annually by 2025. In…
Category: Cybersecurity Insiders
Safeguarding Against Pharming Cyber Attacks: Tips for Enhanced Security
In recent times, we have witnessed a surge in malware attacks, ranging from ransomware to DDoS assaults, crippling networks with overwhelming web traffic. While these attacks are well-known, there is a new digital threat on the horizon called the ‘Pharming…
Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach
Rolls-Royce, the renowned British manufacturing giant, has fallen victim to a sophisticated cyber attack resulting in potential data theft related to its Small Modular Reactor (SMR) technology—an essential device used to generate power for diverse applications and users. The company,…
Juice Jacking Cyber Attack: The Hidden Threat at Public Charging Stations
In an increasingly connected world, our mobile devices have become essential tools for communication, work, and entertainment. However, the constant need to keep our smartphones and tablets charged has led to a new security concern: juice jacking. Juice jacking is…
Combating Cybercrime in the Age of Remote Work
By Dimitri Shelest, Founder and CEO of OneRep The increase in remote and hybrid work since the COVID-19 pandemic has revolutionized the way that companies operate. It has also introduced a new array of cybersecurity threats. Bad actors have more…
Report says no evidence that cyber insurance coverage makes victim pay more
Over the past two years, security analysts have been discussing the impact of cyber insurance on ransomware attacks. There have been claims that companies covered by cyber insurance end up paying higher amounts to hackers who launch such attacks. Tech…
Supply chain attacks demand a 3rd party risk re-think
By Tomislav Pericin, Chief Software Architect at ReversingLabs Looked at from one angle, the recent attack on JumpCloud, a cloud-based identity and access management provider, was unsurprising. The incident, which JumpCloud disclosed in early July, involved a North Korean state-sponsored actor known as Lazarus…
Pioneering Application Security: AI Meets Human Intelligence – Insights from an Interview with ImmuniWeb’s Dr. Ilia Kolochenko
With a growing dependency on digital platforms, cybersecurity has become a pressing concern for businesses worldwide. At the forefront of the battle against cyber threats is ImmuniWeb SA, a global application security company based in Geneva, Switzerland. Since its inception…
RAM dump: Understanding its importance and the process
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of digital forensics and incident…
Captcha security to end for Google and Apple users
Anticipated for the past two years, Google and Apple Inc. have officially announced their plans to discontinue the use of annoying Captchas for all their users by the end of this year. Captchas, which stand for “Completely Automated Public Turing…
Curbing Mobile Malware with Zero Trust: Enhancing Mobile Security
Mobile devices have become an integral part of our daily lives, seamlessly integrating into our personal and professional routines. However, this increased reliance on mobile technology has also made these devices prime targets for cybercriminals seeking to exploit vulnerabilities through…
Protecting energy infrastructure from cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the current geopolitical climate, the energy sector,…
Mobile Device Management: Securing the modern workplace
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. More mobile devices, more problems. The business landscape…
Stories from the SOC: OneNote MalSpam – Detection & response
This blog was co-written with Kristen Perreault – Professional Cybersecurity and James Rodriguez – Sr. Specialist Cybersecurity. Executive summary Since December 22nd, 2022, there has been an increase in malware sent via Phishing emails via a OneNote attachment. As with…
ChatGPT boss wants to scan eyeballs of billions amid AI privacy concerns
Artificial Intelligence technology-based tools have raised concerns about privacy due to the rapid proliferation of Deep Fake Tech in online platforms. ChatGPT’s Chief, Sam Altman, acknowledges the potential privacy issues and proposes a solution to address them. Altman believes that…
Microsoft and Samsung launch Advanced Mobile Security Solution
Microsoft and Samsung Technology have joined forces to enhance mobile device security for enterprises. This collaboration has resulted in the world’s first mobile hardware-based device attestation, which verifies the identity and integrity of the device. In simpler terms, an attestation…
How to Spot Whaling Attacks: Safeguarding Against Targeted Cyber Threats
Cyber threats these days have evolved beyond simple phishing attempts, as attackers are be-coming more sophisticated and targeted in their approaches. One such insidious threat is “whaling attacks” or “CEO fraud,” which targets high-profile individuals within organizations. Whaling attacks are…
Effectively managing security budgets in a recession
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. How can you effectively manage a security budget…
Get the AT&T Cybersecurity InsightsTM Report: Focus on Healthcare
We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™ Report: Focus on Healthcare. It looks at the edge ecosystem, surveying healthcare IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This…
What your peers want to know before buying a DLP tool
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Preventing data loss is a concern for almost…
The human element of Cybersecurity: Nurturing a cyber-aware culture to defend against social engineering attacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As organizations across every sector come to rely…
US SEC makes it mandatory to report cyber attack within 4 days
Security and Exchange Commission(SEC) of the United States has recently approved a crucial draft, mandating that publicly traded companies must promptly report any cyber attacks within four days of the attack’s occurrence or detection. This move aims to prevent companies…
Top 7 ecommerce cybersecurity threats and tips to avoid them
The ecommerce industry is on the rise. According to Statista, global ecommerce sales amounted to approximately $5.2 trillion. Moreover, experts predict this figure to reach about $8.1 trillion by 2026, growing by 56% in the coming years. However, such rapid…
Insights from the cybersecurity trenches: Security is essential as a defensive strategy, but it’s also good for business
By Justin Haney, North America Cybersecurity Lead, Avanade We all know cybersecurity protects data and assets and provides risk mitigation, but what other benefits does a solid cybersecurity infrastructure deliver? In addition to driving efficient essential business operations, companies should…
Settling for the bare minimum is jeopardising your business’ cyber safety
By Guy Golan, Co-Founder and CEO at Performanta The way in which businesses approach cybersecurity and implement defence strategies is outdated and inefficient. And it shows. UK Government research from 2023 revealed that 32% of organisations recall a breach or…
Data Security firm Imperva to be acquired by Thales for $3.5 billion
France based company Thales, that is into the business segment of aerospace and defense has made an official statement that it is going acquire data security firm Imperva for $3.5 billion. Earlier the company was owned by Thoma Bravo and…
User Awareness Training: A Critical Component to Collaboration Tool Security
By Sean Brady, Mimecast VP of Product Management In addition to email, collaboration tools are now a focal point of the cyber threat landscape. While email-borne attacks remain the primary vector exploited by threat actors today, collaboration channels like Microsoft…
From Vulnerability to Vigilance: How Mobile App Evolution Influenced Security Mindsets
By Jon Samsel, senior vice president of global marketing at Verimatrix (www.verimatrix.com) There are a lot of savvy CISOs that recognize their company’s mobile apps are not typically as secure as other facets of their IT infrastructure. So, what do…
Future careers: how to make it in biometrics
A career in biometrics means changing the future. Your work can have a direct positive impact on the lives of individuals and communities worldwide – helping them to access essential services easily, move and travel seamlessly, and be part of…
How to improve employee phishing awareness
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Social engineering has long been a popular tactic…
Unveiling the secrets: Exploring whitespace steganography for secure communication
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of data security, there exists…
Cyber Attack news headlines trending on Google
Temu, the Chinese e-commerce platform specializing in clothing and electronic accessories, is currently facing scrutiny from a US watchdog due to concerns regarding privacy and cybersecurity. Despite its recent expansion to Europe and America, the company has encountered significant challenges,…
Cyber Attack on Norway govt websites identified to Ivanti Security vulnerability
A few days ago, several of the websites operated by Norwegian government were disrupted because of a possible cyber-attack. US-CISA has issued a statement that hackers exploited a flaw in the API flow of Ivanti Endpoint Manager Mobile (EPMM) formerly…
What is an SSL stripping attack
SSL stripping is a type of cyber-attack that targets the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols, which are used to encrypt and secure data transmission over the internet. The primary purpose of SSL/TLS is to ensure…
Ransomware business model-What is it and how to break it?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The threat of ransomware attacks continues to strike…
Google limits internet access to employees to save them from Cyber Attacks
Google, the technology giant of America has launched a Pilot Program with which it safeguards its employees from state funded cyber attacks by limiting their access to internet. Rather we can say that the internet juggernaut is asking its employees…
How Memcyco Battles Brandjacking with a Multi-Layered Defense
Website impersonation is getting more rampant. A 2021 study found that on average, companies across various industries face nearly 1,100 spoofed domain threats per year. Moreover, Statista research shows that several of the world’s leading ecommerce websites, including Amazon, eBay,…
Akira and BlackByte ransomware group claim attack on Yamaha Music Canada
Yamaha Music of Canada that produces musical equipment and is different from Japanese Automobile maker Yamaha Motor Co has issued a statement that its servers were compromised and some of its data was accessed and stolen by hackers. The company…
Artificial Intelligence Governance Professional Certification – AIGP
For anyone who follows industry trends and related news I am certain you have been absolutely inundated by the torrent of articles and headlines about ChatGPT, Google’s Bard, and AI in general. Let me apologize up front for adding yet…
Stories from the SOC: OneNote MalSpam – Detection & response
This blog was co-written with Kristen Perreault – Professional Cybersecurity and James Rodriguez – Sr. Specialist Cybersecurity. Executive summary Since December 22nd, 2022, there has been an increase in malware sent via Phishing emails via a OneNote attachment. As with…
DdoS attack on 12 Norway government websites
Norway is experiencing serious cyber threat from state funded actors and has become a latest victim to a distributed denial of service attack aka DdoS attack. According to the Norway’s Ministry of Local and Regional Development about 12 of its…
Ransomware news trending on Google
In a recent report by Check Point software technologies, it has been revealed that Microsoft’s AI-based chat platform, ChatGPT, has demonstrated the ability to generate ransomware, in addition to creating SEO-friendly content and codes. This discovery underscores the dual nature…
Topics to study for job in Artificial Intelligence
If you are looking to pursue a job in artificial intelligence (AI), it’s essential to have a solid understanding of various topics that underpin this rapidly evolving field. AI is a multidisciplinary domain that combines principles from computer science, mathematics,…
Get the AT&T Cybersecurity InsightsTM Report: Focus on Healthcare
We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™ Report: Focus on Healthcare. It looks at the edge ecosystem, surveying healthcare IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This…
The human element of Cybersecurity: Nurturing a cyber-aware culture to defend against social engineering attacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As organizations across every sector come to rely…
How social media compromises information security
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Today’s companies operate in a complex security environment.…
ChatGPT, the new rubber duck
Introduction Whether you are new to the world of IT or an experienced developer, you may have heard of the debugging concept of the ‘programmer’s rubber duck’. For the uninitiated, the basic concept is that by speaking to an inanimate…
Microsoft offers free cloud security logs after CISA recommend
Microsoft will from this coming September (2023) offer cloud security logs to all its customer, a service that was reserved to premium customers, till date. The announcement came just after the revelation made by Reuters about a possible Chinese hack…
Meta collaborates with Qualcomm for Llama 2 Artificial Intelligence
Qualcomm and Facebook parent company Meta has announced a collaboration for the development of Llama 2 based AI tech on smart phones and connected PCs. The objective of this alliance is to push AI intelligence onto the edge of devices…
How to Draft an Effective Data Protection Strategy
In today’s data-intensive world, protecting critical information is paramount for businesses and firms. With cyber threats on the rise, it’s crucial to develop a robust data protection strategy related to cybersecurity that safeguards not only the data you collect and…
Unveiling the secrets: Exploring whitespace steganography for secure communication
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of data security, there exists…
Protecting energy infrastructure from cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the current geopolitical climate, the energy sector,…
Kevin Mitnick hacker dies unexpectedly at 59
Kevin Mitnick, a renowned hacker, and computer security consultant died on July 16th of 2023 because of pancreatic cancer. The hacker who was convicted in sensational cases for 5 times in 90s is now no more and left behind a…
Russia issues ban on Apple iPhone for security reasons
Russia has issued a ban on the usage of Apple iPhones in government and military sector until further orders. The ban is only applicable to the federal organizations and doesn’t imply to the civilians. The move was anticipated long before…
Navigating the Cyber Insurance landscape as a Gen Z digital citizen
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the modern world, cybersecurity and cyber insurance…
Rubrik offers $10m ransomware compensation to victims
In the face of increasingly sophisticated ransomware attacks, businesses worldwide are grappling with the need to safeguard their valuable data. As cybercriminals continue to evolve their methods, organizations must seek innovative solutions to protect their information and provide peace of…
The Crucial Role of Time Stamps in Data Security
In today’s interconnected digital world, data security has become a paramount concern for individuals, organizations, and governments alike. Protecting sensitive information from unauthorized access and ensuring its integrity is of utmost importance. One effective tool that plays a vital role…
Sophos gets startled by Sophos Encrypt Ransomware
Cybersecurity firm Sophos has released a media update that it doesn’t have any association with the newly discovered Sophos Encrypt Ransomware and is busy investigating its whereabouts and inception. A couple of days ago, MalwareHunter Team investigated and disclosed a…
Automating the API Security Lifecycle – An Interview with Subbu Iyer of Cequence Security
Cequence Security is pioneering innovation in the API security space, and Subbu Iyer, the company’s VP of Product Management, provided a comprehensive understanding of the company’s approach during a recent conversation. His insights offer a fresh perspective on how organizations…
Securing the Digital Frontier: How Caveonix Empowers Cyber Defense
As digital transformation continues to reshape the business landscape, it surfaces a new set of cybersecurity challenges. In a recent interview with Kaus Phaltankar, CEO and co-founder of Caveonix, shared his insights on the rising cybersecurity threats and how AI…
Effectively managing security budgets in a recession
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. How can you effectively manage a security budget…
What is an incident response plan (IRP) and how effective is your incident response posture?
As everyone looks about, sirens begin to sound, creating a sense of urgency; they only have a split second to determine what to do next. The announcer repeats himself over the loudspeaker in short bursts… This is not a drill;…
Cyber Attack news headlines trending on Google
TOMRA, the company that deals with mining and recycling services in Norway was hit by a cyber attack disrupting whole of its systems related to metal sorting, mining machines and food sorting equipment. The company that has an annual turnover…
Ransomware makes two cities declare emergency
In a concerning turn of events, the impact of ransomware attacks has reached such an extent that two cities have been compelled to declare local emergencies due to the crippling effect on their government’s IT infrastructure. Langlade County in Wisconsin…
Get the AT&T Cybersecurity InsightsTM Report: Focus on Healthcare
We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™ Report: Focus on Healthcare. It looks at the edge ecosystem, surveying healthcare IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This…
The Evolution of Threat Defense – An Interview with Steve Povolny of Exabeam
Steve Povolny is Director of Security Research at Exabeam, a leading cybersecurity firm known for its cutting-edge behavioral profiling and machine learning solutions. The firm’s innovative security management platform employs advanced analytics to detect anomalies and safeguard digital assets. In…
The human element of Cybersecurity: Nurturing a cyber-aware culture to defend against social engineering attacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As organizations across every sector come to rely…
Facebook steals crimes information from Police Database
Facebook is found accessing information being reported to the Metropolitan Police database and is doing it without the authorization from the law enforcement agencies. This includes info related to se$ual offenses and domestic abuse case sheets and crimes lodged onto…
CISA’s binding directive shows attackers still feasting on digital supply chain
By Marc Gaffan, CEO of IONIX The digital supply chain is in the attackers crosshairs, and CISA is worried. In mid-June, they issued a Binding Operational Directive, “a compulsory order to the federal, executive branch, departments, and agencies to safeguard…
AI tool WormGPT used to launch Cyber Attacks
According to a recent report by cybersecurity firm SlashNext, a newly developed AI tool called WormGPT is being employed by cybercriminals to launch business email compromise (BEC) attacks. WormGPT operates similarly to Microsoft’s popular conversational AI bot, ChatGPT, but with…
Enhancing Business Resilience: The Importance of Strong Threat Perception
In today’s ever-evolving digital landscape, businesses face an array of threats that can compromise their operations, reputation, and bottom line. To safeguard against these risks effectively, companies must cultivate a robust business threat perception. This article explores why a strong…
Ransomware, extortionware, and theft: Are your security strategies really working?
By Jerald Dawkins, Ph.D., CTO, CISO Global Reflecting on attacks in 2022, SonicWall’s Global Cyber Threat Report reaffirmed what many other reports have stated – that ransomware was on the downward trend in 2022. A handful of high-profile arrests of…
Common ISO/IEC 27001 Pitfalls and How to Avoid Them
By Megan Turner, Technical Specialist of Information Security, NSF-ISR With cyberattacks at an all-time high, it’s necessary for businesses to implement cybersecurity programs and practices. However, many companies either do not know how to improve their information security or their…
ChatGPT, the new rubber duck
Introduction Whether you are new to the world of IT or an experienced developer, you may have heard of the debugging concept of the ‘programmer’s rubber duck’. For the uninitiated, the basic concept is that by speaking to an inanimate…
Stories from the SOC: Fighting back against credential harvesting with ProofPoint
Executive summary Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat…
Unveiling the secrets: Exploring whitespace steganography for secure communication
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the realm of data security, there exists…
What is the difference between incident response & threat hunting?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. When it comes to protecting data in an…
Navigating the Cyber Insurance landscape as a Gen Z digital citizen
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the modern world, cybersecurity and cyber insurance…
FTC starts data security probe on ChatGPT OpenAI
The Federal Trade Commission (FTC) has turned its attention towards ChatGPT, the conversational Chatbot developed by OpenAI and now owned by Microsoft, due to concerns regarding data privacy. The data watchdog has requested that the technology company submit a detailed…
Location Fingerprint: Incognia’s Innovative Answer to Online Fraud Prevention
In the ongoing race between scammers and defenders preventing online fraud, Incognia, the location identity company, is blazing new trails. CEO Andre Ferraz, a serial entrepreneur and technologist, has envisioned and built a solution that harnesses the power of location intelligence,…
Elon Musk to develop maximally curious AI robots with xAI
Twitter Chief Elon Musk has stepped into the technology of Artificial Intelligence by launching a new AI based startup named ‘xAI’. The startup will be poised not against the humanity, but will help build systems that will be maximally curious…
Five 5 free online cybersecurity courses
“Introduction to Cybersecurity” by Cisco Networking Academy: This course provides a comprehensive introduction to cybersecurity concepts and best practices. It covers topics such as networking, cryptography, risk management, and more. You can find this course on the Cis-co Networking Academy…
With new aerospace Cybersecurity rules set to land – What’s the standard for operators?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Following a push for greater cybersecurity capability across…
Stories from the SOC: OneNote MalSpam – Detection & response
This blog was co-written with Kristen Perreault – Professional Cybersecurity and James Rodriguez – Sr. Specialist Cybersecurity. Executive summary Since December 22nd, 2022, there has been an increase in malware sent via Phishing emails via a OneNote attachment. As with…
Twitter sues companies for data scraping to corner Facebook Meta Thread
In recent news, Meta, the parent company of Facebook, has introduced an app called “Thread,” which closely resembles Twitter in terms of features and functionality. The app is now available for free download on the Google Play Store, offering users…
Ransomware attack exposes Swiss Hooligans data onto Dark Web
A ransomware attack that took place on the IT servers of Xplain in June this year, has exposed the details of over 750 Swiss Hooligans, as Federal Office of Police stands one among the company’s clients. Cybersecurity Insiders has learnt…
Unveiling the Top Three Use Cases for SASE: Revolutionizing Network Security and Connectivity
By Jaye Tillson, Director of Strategy, Axis Security Organizations today face the constant challenge of securing their networks and connecting their distributed workforce seamlessly. Introducing Secure Access Service Edge (SASE), an innovative network and security framework that combines wide-area networking…
Cyber Attack news headlines trending on Google
Microsoft has hit the news headlines for repelling a cyber attack targeting government servers from Western Europe. The attack is suspected to have launched by hackers from the Chinese nation and was done to siphon confidential information. According to a…
The 5Ws of the Software Supply Chain — How Security Teams Can Prevent Costly Mistakes
By Javed Hasan, Co-Founder and CEO at Lineaje Software supply chain compromises have been top-of-mind for CISOs and their security teams for the past few years — and rightfully so. The total cost of a software supply chain attack was $4.46…
Ransomware attack on Hayward City of California
Networked servers of the City of Hayward, California were hacked by a notorious ransomware gang demanding a double-digit figure in millions, only to be paid in cryptocurrency. Chuck Finnie, the Communications and Marketing Officer of Hayward City stated that the…
Understanding the Distinction: Ethical Hacking vs. Cybersecurity
In today’s digital landscape, the need for robust security measures is paramount. Two terms that often come up in discussions regarding safeguarding digital systems are “ethical hacking” and “cybersecurity.” While both are essential components of protecting sensitive information and preventing…
The Looming Threat of Business Email Compromise: Insights from John Wilson at Fortra
The relentless wave of digital innovation has come with its share of threats. One such rising threat is Business Email Compromise (BEC). In a recent interview, cybersecurity expert John Wilson, senior fellow threat research at Fortra, explored the complexities of…
What is identity and why is it important?
What is identity? Did you know that identity is actually a mathematical term? It belongs to the scientific theory of social mathematics, which was first studied in the late 18th century by French mathematician and philosopher, Marie Jean Antoine Nicolas…
How social media compromises information security
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Today’s companies operate in a complex security environment.…
Cyber Attack on Australia Ventia
Ventia, an essential service provider to critical infrastructure in Australia and New Zealand was forced to pull down some of its servers that were under the influence of a sophisticated digital attack. Cyber security experts were hired to probed down…
Anonymous Sudan launches DDoS Attack on fan fiction website for 24 hours
Anonymous Sudan, that proclaims to be a pro-russian hacktivist group has claimed that its gang of hackers have launched Distributed Denial of Service (DDoS) attacks on Archive of our Own (AO3) website since Monday morning and will target the same…
UK Finance company loses £20m to Cyber Criminals
Revolut, a financial firm that is governed by Bank of Lithuania within European Union has apparently lost £20m to the act of cyber criminals who smartly drained the funds from the London based financial service provider. Well, the siphoning of…
Warning Issued for ‘Big Head’ Ransomware Targeting Windows Operating System
Microsoft Windows Operating System users have been cautioned about the emergence of a new type of ransomware called ‘Big Head.’ Security analysts at Fortinet have discovered that this malware is being distributed online disguised as Windows security updates and Microsoft…
What is Tailgating in Cyber World
In the cyber world, “tailgating” refers to a deceptive social engineering technique used by hackers to gain unauthorized access to secure areas or systems. Also known as “piggybacking,” this tactic involves an individual without proper authorization following closely behind an…
With new aerospace Cybersecurity rules set to land – What’s the standard for operators?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Following a push for greater cybersecurity capability across…