This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that…
Category: Cybersecurity Insiders
Managing technology risk
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Numerous risks are inherent in the technologies that…
Artificial Intelligence Act gets passed in EU
European Parliament has created a history by adopting the draft that mitigates the risks gener-ated using Artificial Intelligence (AI) technology. Introduced in April 2021, the Artificial Intel-ligence Act was meant to strictly regulate the use of AI by companies, governments…
Microsoft to pay $20m penalty for collecting children info without consent
Microsoft has made an official announcement that it will pay a $20m penalty to the US Federal Trade Commission (FTC) as it was found guilty of collecting children info via gaming consoles without their valid consent. Digging deep into the…
Enhancing Cybersecurity Awareness: A Comprehensive Guide
In our increasingly digital world, where technology permeates every aspect of our lives, cyber-security awareness has become an indispensable skill. With cyber threats on the rise, it is cru-cial for individuals and organizations to prioritize their online safety. This article…
Clop Ransomware gang strikes London Transport for London (TfL)
Clop ransomware gang has targeted the databases of Transport for London (TfL) customers, thus stealing information of over 13,000 drivers listed on the Ulez and Congestion Charges Repository. Clop is the same gang that struck MoveIT file transfer software last…
Rise of AI in Cybercrime: How ChatGPT is revolutionizing ransomware attacks and what your business can do
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. OpenAI’s flagship product, ChatGPT, has dominated the news…
The role of cybersecurity in financial institutions -protecting against evolving threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cybersecurity is practice of protecting information technology (IT)…
How can small businesses ensure Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Small businesses are more vulnerable to cyber-attacks since…
When internet security is a requirement, look to dedicated fiber
With increased dangers lurking in digital spaces, the need for cybersecurity is now a commonly known fact for just about all business owners. When it comes to protecting their network, most start with the basic firewall. While added layers are…
Ransomware related news headlines trending on Google
Ofcom, the UK based communications watchdog has issued a public statement that it could have become a victim of a Russian speaking Clop ransomware attack that exploited SQL Injec-tion Vulerability via MOVEit File transfer software. The Office of Communications (Ofcom)…
The intersection of telehealth, AI, and Cybersecurity
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Artificial intelligence is the hottest topic in tech…
Indian CoWIN data breach not true says government
For the past few hours, there are N number of reports in Indian and International media that da-ta related to vaccinated Indian populace was accessed by hackers and was leaked on a social media platform Telegram, which is owned by…
Understanding AI risks and how to secure using Zero Trust
I. Introduction AI’s transformative power is reshaping business operations across numerous industries. Through Robotic Process Automation (RPA), AI is liberating human resources from the shackles of repetitive, rule-based tasks and directing their focus towards strategic, complex operations. Furthermore, AI and…
Cyber Attack news headlines trending on Google
Foremost is the news related to Manchester University. According to a statement released by the Chief Operating Officer Patrick Hackett, a portion of data was accessed by unauthorized parties who might have copied the information to other servers. The spokesperson…
How Zero Trust helps CIOs and CTOs in Corporate Environments
Zero Trust is a cybersecurity framework that can greatly support Chief Information Security Officers (CISOs) and Chief Technology Officers (CTOs) in their roles of securing organizational systems and data. Zero Trust shifts away from the traditional perimeter-based security approach, which…
Introduction to the purpose of AWS Transit Gateway
Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it…
US Senate concerned about Twitter Data Privacy and Security
A group of lawmakers and privacy experts have raised concerns about the security of user data on Twitter following the departure of key senior officials and the company’s recent acquisition by Elon Musk. In an effort to address these concerns,…
Google offers Cryptomining protection of $1 Million if it fails
Google has recently announced a new initiative aimed at protecting users from cryptomining attacks. The company will be offering a Cryptomining Protection Program Cover, which provides a compensation of up to $1 million to users who experience fraudulent usage of…
Deepfake: Unveiling the Emerging Cybersecurity Threat
With the rapid advancement of artificial intelligence (AI) technology, a new and concerning cybersecurity threat has emerged: deepfakes. Deepfakes are highly realistic manipulated videos or audio recordings that can convincingly depict individuals saying or doing things they never actually did.…
Three ways agribusinesses can protect vital assets from cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In an era where digital technology increasingly underpins…
Using social media as a tool to share knowledge on day-to-day Cybersecurity risks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. When most people think about social media and…
Putin false prey to Deepfake Cyber Attack
A hacker group, potentially associated with the Ukrainian government, allegedly took control of radio and TV broadcasts, using them to transmit a falsified message attributed to Russian President Putin. The fabricated message claimed that the Kremlin planned to impose martial…
The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy
Jaye Tillson, Director of Strategy, Axis Security In recent years, the concept of zero trust has regained popularity in the field of cybersecurity. While the idea of zero trust has been around for decades, it has gained renewed attention due…
ChatGPT used to launch phishing and ransomware attacks
ChatGPT, the conversational bot developed by OpenAI and now owned by Microsoft has hit the news headlines for wrong reasons. A senior government official from UAE has alleged that the chat-based platform is being used by criminals to launch phishing…
How can small businesses ensure Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Small businesses are more vulnerable to cyber-attacks since…
When internet security is a requirement, look to dedicated fiber
With increased dangers lurking in digital spaces, the need for cybersecurity is now a commonly known fact for just about all business owners. When it comes to protecting their network, most start with the basic firewall. While added layers are…
Anonymous Sudan launched Cyber Attack on Microsoft Outlook
Outlook.com users have been suffering with intermittent outages from yesterday and news is out that the disruption was caused because of a DDoS cyber attack launched by a hacking group named ‘Anonymous Sudan’. Microsoft acknowledged the outage as true, but…
Three Risk Mitigation Strategies to Address the Latest Data Security Threats
By Dannie Combs, Senior Vice President and CISO, Donnelley Financial Solutions (DFIN) As security threats to data continue to ebb and flow (mostly flow!), I am keeping a close eye on regulations, identity and access management (IAM), and Artificial Intelligence (AI) —…
Learnings from 2022 Breaches: Reassessing Access Controls and Data Security Strategies
Gal Helemski, Co-Founder & CTO/CPO of PlainID Many lessons can be learned when reflecting on 2022’s slew of data breaches. As we understand more about data security and, even more so, as data becomes more fluid, complex and dynamic, it’s…
Apple offers new privacy and security protections at WWDC
During the recent Worldwide Developers Conference (WWDC), Apple Inc. unveiled a range of new privacy and security features designed to enhance user protection. One notable feature is aimed at safeguarding children against online spying tools, while another focuses on maintaining…
Will zero trust make any sense in enterprise cyber world
Zero Trust is an emerging cybersecurity framework that challenges the traditional perimeter-based security model. In the enterprise cyber world, where the threat landscape is constantly evolving, Zero Trust offers a compelling approach to enhancing security and protecting sensitive data. Here’s…
Sharing your business’s data with ChatGPT: How risky is it?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a natural language processing model, ChatGPT –…
Phishing-resistant MFA 101: What you need to know
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The spread of the remote workforce and the…
The role of cybersecurity in financial institutions -protecting against evolving threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cybersecurity is practice of protecting information technology (IT)…
The intersection of telehealth, AI, and Cybersecurity
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Artificial intelligence is the hottest topic in tech…
North Korean cyber attacks income and free VPN data breach
According to a report published by Japanese news resource Nikkei, it has been revealed that the North Korean government is actively engaging in cyber attacks on the digital infrastructure of its adversaries. This information is not entirely new, as many…
Managing technology risk
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Numerous risks are inherent in the technologies that…
SeroXen RAT for sale
This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that…
Hackers exploit Gmail Blue checkmark impacting 1.8 billion Google users
Attention all business Gmail account holders, it is crucial to stay informed about the following news story. Security experts have issued a warning regarding the exploitation of the Gmail Blue Check Mark feature by scammers. These individuals are utilizing the…
Three ways agribusinesses can protect vital assets from cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In an era where digital technology increasingly underpins…
Introduction to the purpose of AWS Transit Gateway
Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it…
Zellis Cybersecurity Incident causes BA and Boots employee info data breach
Hackers somehow managed to exploit a vulnerability in Moveit file transfer software and ac-cessed information from the servers of Zellis, a payroll service provider in Britain. Unfortu-nately, British Airways (BA) and Boots are two among the list of companies that…
Safeguarding Your Privacy Online: Essential Tips and Best Practices
In an increasingly connected world, where our lives revolve around the internet, safeguarding our privacy online has become paramount. From social media platforms to online shopping and banking, we share a wealth of personal information that can be vulnerable to…
AI news trending on Google
To those interested in known news bits on the technology of Artificial Intelligence, here some fuel for thought. According to a report published in New York Post, a woman located in the same city has married a virtual man generated…
Two Years Since the Colonial Pipeline Hack, Here’s What We’ve Learned
By Matt Morris, Global Managing Director of 1898 & Co. Two years have passed since the notorious Colonial Pipeline hack, an incident that plunged the nation into a state of emergency, causing fuel disruptions in airlines and commercial sectors, and…
How to Protect Operational Technology (OT) from Cyber Threats
By Jayakumar (Jay) Kurup, Global Sales Engineering Director at Morphisec Securing operational technology (OT) creates unique challenges. Zero tolerance of downtime in factories, ports, banks, treatment plants, and other OT environments means that standard security practices like patch management or…
Netflix password sharing crackdown can be hacked with a new VPN
To all those who are concerned about Netflix’s decision to ban password sharing in almost 100 countries, here’s a solution that appears to work for now. A new VPN called Meshnet allows multiple users to connect from the same IP…
Navigating the complex world of Cybersecurity compliance
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cyberattacks have become increasingly common, with organizations of…
Encrypting files and emails: A beginner’s guide to securing sensitive information
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s digital age, sensitive information is constantly…
Amazon agrees to pay $31 after FTC Privacy and Security charges
Amazon has recently reached a settlement with the Federal Trade Commission (FTC) and agreed to pay a $31 million penalty in response to two civil complaints. The charges against the retailing giant involved allegations of invading the privacy of its…
The Evolving Landscape of Cybersecurity: Trends and Challenges
In today’s interconnected world, where technology permeates every aspect of our lives, ensuring robust cybersecurity has become an utmost priority. With the ever-evolving threat landscape, it is crucial to stay informed about the latest trends and challenges in the field…
When internet security is a requirement, look to dedicated fiber
With increased dangers lurking in digital spaces, the need for cybersecurity is now a commonly known fact for just about all business owners. When it comes to protecting their network, most start with the basic firewall. While added layers are…
CISOs: How to improve cybersecurity in an ever-changing threat landscape
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The digital landscape is always changing to keep…
Embracing Advanced Frameworks for Effective Vulnerability Management
The shifting landscape of cybersecurity poses significant challenges for traditional vulnerability management approaches. The difficulties often arise from a lack of automation and a compartmentalized “silo” approach. Unfortunately, the full potential of modern, sophisticated vulnerability management frameworks is yet to…
The role of cybersecurity in financial institutions -protecting against evolving threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cybersecurity is practice of protecting information technology (IT)…
The intersection of telehealth, AI, and Cybersecurity
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Artificial intelligence is the hottest topic in tech…
Ransomware attack on Biotech company exposes info of over 2.5 million patients
A recent ransomware attack on a New York-based biotech company, Enzo Biochem, has resulted in the exposure of sensitive information belonging to more than 2.5 million patients. The cyber incident, which occurred on April 6th, compromised clinical test data and…
Cyber Attack on exams and its impact on ambulances
A cyber-attack has made the staff of Idaho Falls Community Hospitals to divert emergency ambulances elsewhere as it is struggling to mitigate the risks associated with the incident. Although the 88-bed hospital is taking good care of the inhouse patients…
Sharing your business’s data with ChatGPT: How risky is it?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a natural language processing model, ChatGPT –…
Shadow Data Concerns, Public Cloud Breaches Remain Sky-High: Here’s How Organizations Can Protect Themselves
By Andy Smith, Chief Marketing Officer, Laminar The same technologies powering cloud transformation and data democratization are also introducing the greatest risks to data security, data privacy and data governance professionals. Right now, we’re in the midst of cloud data’s…
Solar Panels at Risk of Cyber Attacks, warn Experts
According to experts from Digital Watchdog RDI, solar panels are now vulnerable to cyber attacks, with hackers targeting the vulnerabilities in the inverters that store energy for powering smartphones, laptops, and small electrical gadgets. This conclusion was reached after a…
SeroXen RAT for sale
This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that…
Phishing-resistant MFA 101: What you need to know
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The spread of the remote workforce and the…
UberEats to use 2000 AI powered robots for delivery by 2026
Many technologists around the world are arguing that the use of AI technology might spell doom for mankind in the near future. Amidst such concerns of “risk of extinction,” UberEats has made an official statement that it plans to use…
The Transformative Power of Artificial Intelligence in Healthcare
Artificial Intelligence (AI) has emerged as a disruptive force across various industries, and its potential impact on healthcare is nothing short of revolutionary. With advancements in machine learning and data analytics, AI has the ability to transform healthcare delivery, improve…
Go Phish: How Attackers Utilize HTML Files to Evade Security
By Motti Elloul, VP Customer Success and Incident Response, Perception Point Email phishing scams are nothing new. But they are growing increasingly prevalent and sophisticated – over 3 billion phishing emails are sent every day, and the tactics used to…
The Rush to SaaS Modernization Can Result in Reputational Damage
By Hananel Livneh, Head of Product Marketing, Adaptive Shield Successful cyberattacks tend to hit companies with the force of an 80-foot wave. The initial damage is quickly apparent. Like ships that lose railings and experience instability, businesses are immediately faced…
Introduction to the purpose of AWS Transit Gateway
Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it…
Things ChatGPT cannot but Google Bard can do
Google has released its new AI chat service dubbed Bard in over 180 countries, with 15 more to follow by the end of next month. Bard is nothing but a Google owned and a sure-shot competitor to Microsoft-owned OpenAI-developed ChatGPT…
Cybersecurity news headlines trending on Google
MCNA, also known as Managed Care of North American Dental, has issued a statement on its website regarding a data breach it is currently experiencing, which has compromised the information of over 9 million patients. As the largest government-sponsored health…
US Augusta City targeted by BlackByte Ransomware Group
The City of Augusta in the United States has been struggling to regain control of its computer network as hackers spread ransomware, reportedly stealing data and encrypting the database until a ransom is paid. To substantiate their claims, the BlackByte…
Now ransomware hackers targeting backups for ransom pay assurance
A new study conducted by Veeam Software claims that hackers have shifted their focus towards backup storage appliances, as they provide assurance that the victim will definitely pay the demanded ransom amount. According to Veeam’s 2023 Ransomware Trends report, one…
Cybersecurity Research Topics for Beginners: Exploring the Fundamentals
In today’s digital landscape, cybersecurity has become a critical concern for individuals and organizations alike. Aspiring cybersecurity researchers often wonder where to start and what areas to explore. This article aims to provide a comprehensive list of cybersecurity research topics…
Unleashing the Power of AI with Caution: Understanding Cybersecurity Risks
Artificial Intelligence (AI) has emerged as a game-changer, revolutionizing industries and transforming the way we live and work. However, as AI continues to advance, it brings with it a new set of cybersecurity risks and challenges. In this blog, we…
Insider threat leads to Tesla data breach
A Tesla employee has reportedly stole about 100GB of data related to the automaker and handed it over to a media company, which has now released a portion of the details. According to a German media resource Handelsblatt, the leaked…
AI demand accelerates NVIDIA market value to $1 trillion
NVIDIA’s market value is set to soar to an impressive $1 trillion by the end of this year, driven by the rising demand for processors in the Artificial Intelligence (AI) technology sector. With sales reaching a record-breaking $11 billion and…
Will AI technology change our lives to good or bad
The impact of AI technology on our lives is a complex and multifaceted topic. It has the potential to bring both positive and negative changes, depending on how it is developed, implemented, and regulated. Here are some key considerations: Positive…
Happy Mother’s Day! Serving, surviving, and thriving as a mom with a cyber career
Being a mother and working in cybersecurity necessitates unique skillsets. As mothers, we understand time management, communication, and positive reinforcement. We emphasize the value of clear instructions and providing positive reinforcement. Mothers possess the capacity to remain calm and composed…
ChatGPT now generates Malware mutations
ChatGPT, the AI-based chatbot developed by Microsoft, can answer anything and everything. However, can you imagine that chatbot assistance is also being used to create malware and its various mutations? Threat Intelligence company ‘WithSecure’ has discovered this activity and raised…
Navigating the complex world of Cybersecurity compliance
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cyberattacks have become increasingly common, with organizations of…
OneNote documents have emerged as a new malware infection vector
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Intro In February 2022, Microsoft disabled VBA macros…
Microsoft alerts United States on Volt Typhoon Cyber Attack campaign
In a recent advisory, Microsoft has called upon critical infrastructure companies operating in the United States to enhance their cyber defenses in order to safeguard communication infrastructure from potential disruptions. The announcement highlights a significant conspiracy aimed at severing communication…
Memcyco Raises $10M To Deliver Real-Time Brandjacking Protection
TEL AVIV, Israel, May 24, 2023 — Memcyco, the real-time website impersonation detection and prevention solution, has completed a $10 million seed round led by Capri Ventures and Venture Guides. Brandjacking is among the most common forms of cyberattacks globally.…
British pregnant women are unwittingly handing over their Genetic data to China
Recent reports have revealed a shocking truth about the inadvertent sharing of prenatal NIFTY blood test data by thousands of pregnant British women with a Chinese company called BGI Group. This company, allegedly affiliated with the People’s Liberation Army, has…
When internet security is a requirement, look to dedicated fiber
With increased dangers lurking in digital spaces, the need for cybersecurity is now a commonly known fact for just about all business owners. When it comes to protecting their network, most start with the basic firewall. While added layers are…
Encrypting files and emails: A beginner’s guide to securing sensitive information
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s digital age, sensitive information is constantly…
How to Track Ransomware Attacks: A Comprehensive Guide
Ransomware attacks have become a growing concern in recent years, with cybercriminals targeting individuals, businesses, and even government organizations. The ability to track these attacks is crucial for mitigating their impact and ensuring appropriate response measures are taken. In this…
Ransomware news trending on Google
A Russian government affiliated ransomware spreading group has targeted the Indian Insurance Information Bureau (IIB) and encrypted the entire database and their demand is that they victim needs to pay $250,000 in bitcoins in exchange of a decryption key. The…
CISOs: How to improve cybersecurity in an ever-changing threat landscape
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The digital landscape is always changing to keep…
Most Organizations Expect Ransomware Attack Within a Year
BullWall, global leaders in ransomware containment, and researchers with Cybersecurity Insiders, today published the Cybersecurity Insiders 2023 Ransomware Report. Based on a survey of 435 cybersecurity professionals, the findings identified gaps, misunderstandings and obstacles in organizational security posture, attack prevention…
Avos Ransomware takes control of emergency systems in Bluefield University
It is customary for the ransomware spreading hackers to take control of the systems and encrypt them until a ransom is paid. In double extortion cases, the hackers steal data and then encrypt the database. And if the victim fails…
The intersection of telehealth, AI, and Cybersecurity
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Artificial intelligence is the hottest topic in tech…
Cyber threat with iPhone Phone Link feature on Windows 11 laptops
Attention Windows 11 users who rely on their PCs to respond to messages and phone calls from their iPhones, an important cybersecurity alert requires your immediate attention. Recently, Apple Inc, the renowned technology giant, introduced a feature called Phone Link,…
Sharing your business’s data with ChatGPT: How risky is it?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a natural language processing model, ChatGPT –…
Facebook Meta faces €1.3 billion penalty by GDPR
Facebook parent company Meta has been slapped with a penalty of €1.2 billion for transferring data of European users to the servers operating in the United States. A move that is dead-against the GDPR rules that came into existence since…
Cyber Attack on European Space Agency to compromise satellite imaging data
Several ethical hackers recently accepted a challenge posed by the European Space Agency (ESA) to assess the resilience of satellite infrastructure by attempting to infiltrate servers and compromise satellite imaging sensors and data. Fortunately, this hacking exercise was conducted solely…
Exploring Cybersecurity Research Topics for Master’s Degree Studies
As the field of cybersecurity continues to evolve and expand, pursuing a Master’s degree in this discipline offers an opportunity to delve into cutting-edge research and contribute to the advancement of knowledge in this critical area. Whether you’re passionate about…
RSAC 2023 | Cybersecurity research on edge computing generates big interest
RSAC 2023 was a huge success. We launched our 2023 AT&T Cybersecurity Insights Report, which was met with enthusiasm by the industry and the media. In fact, Will Townsend, writing for Forbes, noted that our report joined other great research…
Hive Ransomware? Let’s Learn All About It
By Aaron Sandeen, CEO and co-founder at Securin Since June 2021, Hive Ransomware has been dominating the ransomware scene. Their reach has affected more than 1,500 organizations resulting in Hive receiving ransom payments totaling $100 million. With all the buzz…