Category: Cybersecurity Insiders

SeroXen RAT for sale

This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that…

Managing technology risk

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Numerous risks are inherent in the technologies that…

Artificial Intelligence Act gets passed in EU

European Parliament has created a history by adopting the draft that mitigates the risks gener-ated using Artificial Intelligence (AI) technology. Introduced in April 2021, the Artificial Intel-ligence Act was meant to strictly regulate the use of AI by companies, governments…

Enhancing Cybersecurity Awareness: A Comprehensive Guide

In our increasingly digital world, where technology permeates every aspect of our lives, cyber-security awareness has become an indispensable skill. With cyber threats on the rise, it is cru-cial for individuals and organizations to prioritize their online safety. This article…

How can small businesses ensure Cybersecurity?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Small businesses are more vulnerable to cyber-attacks since…

Ransomware related news headlines trending on Google

Ofcom, the UK based communications watchdog has issued a public statement that it could have become a victim of a Russian speaking Clop ransomware attack that exploited SQL Injec-tion Vulerability via MOVEit File transfer software. The Office of Communications (Ofcom)…

The intersection of telehealth, AI, and Cybersecurity

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Artificial intelligence is the hottest topic in tech…

Indian CoWIN data breach not true says government

For the past few hours, there are N number of reports in Indian and International media that da-ta related to vaccinated Indian populace was accessed by hackers and was leaked on a social media platform Telegram, which is owned by…

Understanding AI risks and how to secure using Zero Trust

I. Introduction AI’s transformative power is reshaping business operations across numerous industries. Through Robotic Process Automation (RPA), AI is liberating human resources from the shackles of repetitive, rule-based tasks and directing their focus towards strategic, complex operations. Furthermore, AI and…

Cyber Attack news headlines trending on Google

Foremost is the news related to Manchester University. According to a statement released by the Chief Operating Officer Patrick Hackett, a portion of data was accessed by unauthorized parties who might have copied the information to other servers. The spokesperson…

How Zero Trust helps CIOs and CTOs in Corporate Environments

Zero Trust is a cybersecurity framework that can greatly support Chief Information Security Officers (CISOs) and Chief Technology Officers (CTOs) in their roles of securing organizational systems and data. Zero Trust shifts away from the traditional perimeter-based security approach, which…

Introduction to the purpose of AWS Transit Gateway

Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it…

Deepfake: Unveiling the Emerging Cybersecurity Threat

With the rapid advancement of artificial intelligence (AI) technology, a new and concerning cybersecurity threat has emerged: deepfakes. Deepfakes are highly realistic manipulated videos or audio recordings that can convincingly depict individuals saying or doing things they never actually did.…

Putin false prey to Deepfake Cyber Attack

A hacker group, potentially associated with the Ukrainian government, allegedly took control of radio and TV broadcasts, using them to transmit a falsified message attributed to Russian President Putin. The fabricated message claimed that the Kremlin planned to impose martial…

ChatGPT used to launch phishing and ransomware attacks

ChatGPT, the conversational bot developed by OpenAI and now owned by Microsoft has hit the news headlines for wrong reasons. A senior government official from UAE has alleged that the chat-based platform is being used by criminals to launch phishing…

How can small businesses ensure Cybersecurity?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Small businesses are more vulnerable to cyber-attacks since…

Anonymous Sudan launched Cyber Attack on Microsoft Outlook

Outlook.com users have been suffering with intermittent outages from yesterday and news is out that the disruption was caused because of a DDoS cyber attack launched by a hacking group named ‘Anonymous Sudan’. Microsoft acknowledged the outage as true, but…

Apple offers new privacy and security protections at WWDC

During the recent Worldwide Developers Conference (WWDC), Apple Inc. unveiled a range of new privacy and security features designed to enhance user protection. One notable feature is aimed at safeguarding children against online spying tools, while another focuses on maintaining…

Will zero trust make any sense in enterprise cyber world

Zero Trust is an emerging cybersecurity framework that challenges the traditional perimeter-based security model. In the enterprise cyber world, where the threat landscape is constantly evolving, Zero Trust offers a compelling approach to enhancing security and protecting sensitive data. Here’s…

Phishing-resistant MFA 101: What you need to know

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The spread of the remote workforce and the…

The intersection of telehealth, AI, and Cybersecurity

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Artificial intelligence is the hottest topic in tech…

Managing technology risk

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Numerous risks are inherent in the technologies that…

SeroXen RAT for sale

This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that…

Introduction to the purpose of AWS Transit Gateway

Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it…

AI news trending on Google

To those interested in known news bits on the technology of Artificial Intelligence, here some fuel for thought. According to a report published in New York Post, a woman located in the same city has married a virtual man generated…

How to Protect Operational Technology (OT) from Cyber Threats

By Jayakumar (Jay) Kurup, Global Sales Engineering Director at Morphisec Securing operational technology (OT) creates unique challenges. Zero tolerance of downtime in factories, ports, banks, treatment plants, and other OT environments means that standard security practices like patch management or…

Navigating the complex world of Cybersecurity compliance

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Cyberattacks have become increasingly common, with organizations of…

Embracing Advanced Frameworks for Effective Vulnerability Management

The shifting landscape of cybersecurity poses significant challenges for traditional vulnerability management approaches. The difficulties often arise from a lack of automation and a compartmentalized “silo” approach. Unfortunately, the full potential of modern, sophisticated vulnerability management frameworks is yet to…

The intersection of telehealth, AI, and Cybersecurity

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Artificial intelligence is the hottest topic in tech…

Cyber Attack on exams and its impact on ambulances

A cyber-attack has made the staff of Idaho Falls Community Hospitals to divert emergency ambulances elsewhere as it is struggling to mitigate the risks associated with the incident. Although the 88-bed hospital is taking good care of the inhouse patients…

Solar Panels at Risk of Cyber Attacks, warn Experts

According to experts from Digital Watchdog RDI, solar panels are now vulnerable to cyber attacks, with hackers targeting the vulnerabilities in the inverters that store energy for powering smartphones, laptops, and small electrical gadgets. This conclusion was reached after a…

SeroXen RAT for sale

This blog was jointly written with Alejandro Prada and Ofer Caspi. Executive summary SeroXen is a new Remote Access Trojan (RAT) that showed up in late 2022 and is becoming more popular in 2023. Advertised as a legitimate tool that…

Phishing-resistant MFA 101: What you need to know

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The spread of the remote workforce and the…

Introduction to the purpose of AWS Transit Gateway

Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it…

Things ChatGPT cannot but Google Bard can do

Google has released its new AI chat service dubbed Bard in over 180 countries, with 15 more to follow by the end of next month. Bard is nothing but a Google owned and a sure-shot competitor to Microsoft-owned OpenAI-developed ChatGPT…

Cybersecurity news headlines trending on Google

MCNA, also known as Managed Care of North American Dental, has issued a statement on its website regarding a data breach it is currently experiencing, which has compromised the information of over 9 million patients. As the largest government-sponsored health…

US Augusta City targeted by BlackByte Ransomware Group

The City of Augusta in the United States has been struggling to regain control of its computer network as hackers spread ransomware, reportedly stealing data and encrypting the database until a ransom is paid. To substantiate their claims, the BlackByte…

Insider threat leads to Tesla data breach

A Tesla employee has reportedly stole about 100GB of data related to the automaker and handed it over to a media company, which has now released a portion of the details. According to a German media resource Handelsblatt, the leaked…

Will AI technology change our lives to good or bad

The impact of AI technology on our lives is a complex and multifaceted topic. It has the potential to bring both positive and negative changes, depending on how it is developed, implemented, and regulated. Here are some key considerations: Positive…

ChatGPT now generates Malware mutations

ChatGPT, the AI-based chatbot developed by Microsoft, can answer anything and everything. However, can you imagine that chatbot assistance is also being used to create malware and its various mutations? Threat Intelligence company ‘WithSecure’ has discovered this activity and raised…

Navigating the complex world of Cybersecurity compliance

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Cyberattacks have become increasingly common, with organizations of…

Microsoft alerts United States on Volt Typhoon Cyber Attack campaign

In a recent advisory, Microsoft has called upon critical infrastructure companies operating in the United States to enhance their cyber defenses in order to safeguard communication infrastructure from potential disruptions. The announcement highlights a significant conspiracy aimed at severing communication…

How to Track Ransomware Attacks: A Comprehensive Guide

Ransomware attacks have become a growing concern in recent years, with cybercriminals targeting individuals, businesses, and even government organizations. The ability to track these attacks is crucial for mitigating their impact and ensuring appropriate response measures are taken. In this…

Ransomware news trending on Google

A Russian government affiliated ransomware spreading group has targeted the Indian Insurance Information Bureau (IIB) and encrypted the entire database and their demand is that they victim needs to pay $250,000 in bitcoins in exchange of a decryption key. The…

Most Organizations Expect Ransomware Attack Within a Year

BullWall, global leaders in ransomware containment, and researchers with Cybersecurity Insiders, today published the Cybersecurity Insiders 2023 Ransomware Report. Based on a survey of 435 cybersecurity professionals, the findings identified gaps, misunderstandings and obstacles in organizational security posture, attack prevention…

The intersection of telehealth, AI, and Cybersecurity

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Artificial intelligence is the hottest topic in tech…

Facebook Meta faces €1.3 billion penalty by GDPR

Facebook parent company Meta has been slapped with a penalty of €1.2 billion for transferring data of European users to the servers operating in the United States. A move that is dead-against the GDPR rules that came into existence since…

Hive Ransomware? Let’s Learn All About It

By Aaron Sandeen, CEO and co-founder at Securin Since June 2021, Hive Ransomware has been dominating the ransomware scene. Their reach has affected more than 1,500 organizations resulting in Hive receiving ransom payments totaling $100 million. With all the buzz…