Category: Cybersecurity Insiders

Phishing-resistant MFA 101: What you need to know

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The spread of the remote workforce and the…

Microsoft VMs hijacked in cloud Cyber Attack

A threat actor with a history of targeting Microsoft servers has recently gained control over virtual machines (VMs) and installed third-party remote management software within clients’ cloud environments. The Mandiant Intelligence team has identified this actor, known as UNC3844, evading…

The Vital Importance of Cybersecurity for Profit-Making Organizations

In today’s digital age, profit-making organizations across industries are increasingly reliant on technology and the internet to conduct their operations. While this technological advancement brings numerous benefits, it also exposes businesses to various cybersecurity risks. Protecting sensitive data, customer information,…

Beware of ChatGPT and Midjourney imposters

To all those who are eagerly searching for ChatGPT login and Midjourney web pages, here’s an alert that needs your immediate attention. A threat actor named BatLoader has started a campaign of hosting fake ChatGPT and Midjourney webpages on Google…

Scans required for PCI DSS compliance

This is the fifth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…

Navigating the complex world of Cybersecurity compliance

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Cyberattacks have become increasingly common, with organizations of…

Architecture Matters When it Comes to SSE

by John Spiegel, Director of Strategy, Axis Security Gartner just released the 2023 version of their “Magic Quadrant” for Secure Service Edge or SSE. Cheers are being heard from the companies who scored upper righthand and jeers being shouted for…

Understanding Cyber Risk and the C-Suite

by J2 Software CEO John Mc Loughlin The threat landscape for businesses has evolved significantly in recent years, with cyberattacks becoming more sophisticated and frequent. As a result, cybersecurity has become a top priority for organisations of all sizes, and…

Technology based acquisition news trending on Google

IBM has made a smart move to address the issue of cloud data protection by acquiring Polar Security, a company specializing in automated data protection. The tech giant has officially announced that this new acquisition will assist companies in tackling…

The Transformative Power of Artificial Intelligence Across Industries

The pervasive influence of Artificial Intelligence (AI) is propelling a remarkable wave of transformation across diverse sectors. As AI technologies become increasingly integrated, industries are witnessing unprecedented changes that enhance productivity, streamline operations, and optimize decision-making processes. The growing adoption…

Ransomware News Headlines Trending on Google

A new ransomware group dubbed RA Group has been hitting the news headlines for the past two weeks. The group is targeting organizations operating in the United States and South Korea. Currently, it appears that the attackers are primarily focusing…

How is information stored in cloud secure from hacks

The rise of cloud computing has provided individuals and businesses with a convenient way to store and access their data. However, with this convenience comes a concern about data security. Cloud storage services have become a target for hackers, and…

How Compliance Automation Can Transform Your Next Audit

Automation transforms the audit experience. What was once a burden to bear becomes a competitive advantage that lets your company maximize every opportunity. Streamlining the audit process is not the only benefit compliance automation. From higher productivity to stronger security…

How to avoid mothers day scams

Coming May 14th, 2023, most of the world will be celebrating Mother’s Day for this year. So, obviously many of the daughters and sons will be shopping to gift for their loved ones and this is where scammers will be…

Black Basta Ransomware attack on ABB Group LTD

ABB Group that is into the business field of offering Automation Technology was reportedly hit by Black Basta Ransomware attack. The Swiss based multinational company said that the attack hits its business operations and has been contained. However, some of…

Cyber Attack on Tokyo MoU compromises data

Tokyo MoU, the most active regional port control organization in the Asia Pacific, has revealed that its data was compromised for months and that hackers gained fraudulent access through a cyber attack. It is unclear how the attack has impacted…

Improving your bottom line with cybersecurity top of mind

In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it’s essential to recognize that cybersecurity is a valuable investment in your company’s security and…

Australia TechnologyOne hit by a Cyber Attack

TechnologyOne, the Australia-based trading firm, has issued a statement stating that some of its systems were targeted by a cyber attack, as a result of which it halted the entire trading process, impacting millions of customers. Unconfirmed sources state that…

How do password managers make sense

In today’s digital age, managing passwords has become increasingly complex. With the average internet user having more than 100 passwords to remember, it’s no wonder that people often resort to using weak passwords that are easy to remember or reuse…

Scans required for PCI DSS compliance

This is the fifth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when…

Microsoft new ChatGPT to address all privacy concerns

Microsoft is now an undoubted owner of the AI conversational tool ChatGPT developed by OpenAI. It was released in November last year and since then has faced backlash from a small sect of technology enthusiasts regarding privacy concerns. The Windows…

Get ready for RSA 2023: Stronger Together

Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in…

Lessons From the Fortune 100 About Cloud-Native Application Security

By Ratan Tipirneni, President and CEO, Tigera   While cloud-native technologies are relatively new to many businesses, Global 2,000 companies have run containers and distributed applications at scale for over a decade. Although these household-name companies are high-profile targets for hackers, they…

Empire of Hackers launched by CIA targets China

It is concerning to hear about the allegations and warnings issued by China’s National Computer Virus Emergency Response Centre (CVERC) regarding the CIA’s involvement in cyber-attacks on critical infrastructure and the use of the “Empire of Hackers” group for orchestrating…

How 5G network is immune to Cyber Attacks

It is not accurate to say that 5G networks are completely immune to cyber attacks. Like any other network, 5G networks are vulnerable to various types of cyber attacks, such as distributed denial-of-service (DDoS) attacks, phishing attacks, and malware infections.…

10 Effective Ways to Protect Your Privacy Online

The internet has transformed our lives in many positive ways, but it has also created a new set of challenges, such as the need to protect our privacy online. With so much personal infor-mation available on the internet, it is…

Facebook Meta uncovers Social Media Espionage

Meta, the parent company of Facebook, has uncovered a new social media espionage campaign in which cyber criminals launch social engineering attacks on Facebook and Instagram users by asking them to click on malevolent links, download malware, or share personal…

Godfather of AI quits Google to save the world

Geoffrey Hinton, who is known to the world as Godfather of AI has made an official an-nouncement that he will quit his position at Google for the betterment of humans from the de-velopments of the technology. Mr. Hinton released a…

Improving your bottom line with cybersecurity top of mind

In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it’s essential to recognize that cybersecurity is a valuable investment in your company’s security and…

Today’s CISO Insights – How to Tackle the Quantum Threat

By: Craig Debban, Chief Information Security Officer, QuSecure, Inc. As you may have noticed, daily headlines around quantum computing and its impact on technologies are becoming commonplace. This is driven by the fact that quantum computers will be able to perform certain types…

Insider Risk: Unconventional Thoughts and Lessons Learned

By: Daron Hartvigsen, Managing Director, StoneTurn and Luke Tenery, Partner, StoneTurn When insider threat or insider risk is discussed in a corporate context, often the relevant topics include misconduct, fraud, misuse, or even the idea that insiders can be unwitting…

Who are Cyber Swindlers

Cyber swindlers, also known as cyber fraudsters, are individuals or groups who use the internet and technology to commit fraud or deception for financial gain. They use various methods, such as phishing scams, identity theft, credit card fraud, and other…

The Evolution of Data Security Solutions

By Dan Benjamin, Co-Founder and CEO, Dig Security Approximately 60% of corporate data now lives in the cloud, a number that has doubled over the last seven years. While the concept of cloud computing dates back decades, it is only…

China has 50 hackers against each FBI Cyber Warrior

The FBI Director disclosed to the Congressional Committee that China has assigned around 50 hackers against each bureau’s Cyber Warriors, thus opening-up  about the threats it was facing from the adversary. Christopher Wray, the director of the FBI, spoke to…

How social engineering is related to Cybersecurity

Social engineering is a term used to describe the manipulation of people into revealing sensitive information or performing actions that they otherwise wouldn’t. It is an ever-increasing threat to cybersecurity, as it can be used to gain unauthorized access to…

Google bans 173,000 malicious app developers

Google has issued a ban on approximately 173,000 application developers who tried various methods to get their software published on its Play Store. The web search giant has officially confirmed that it has weeded out a large number of bad…

Get ready for RSA 2023: Stronger Together

Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in…

Intel allows Google to hack its servers

Intel gave permission to Google to hack its servers operating on its new security hardware product dubbed “Trust Domain Extensions” (TDX). According to sources reporting to our cybersecurity insiders, permission to infiltrate its servers was given almost 10 months ago…

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?

Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam voluptatum?Et esse laboriosam At consequatur nemo eum quibusdam…

F-Secure to acquire Lookout Mobile Security

F-Secure has made an official announcement that it is going to acquire the mobile security business of Lookout, and the deal might be completed by June of this year. Although the financial terms are yet to be disclosed on an…

Is the fear of AI being overblown

Artificial intelligence (AI) is a buzzword that has gained significant traction over the past decade. Many experts predict that AI will transform industries and change the way we live and work. However, there is also a growing fear that AI…

Improving your bottom line with cybersecurity top of mind

In times of economic downturn, companies may become reactive in their approach to cybersecurity management, prioritizing staying afloat over investing in proactive cybersecurity measures. However, it’s essential to recognize that cybersecurity is a valuable investment in your company’s security and…