Category: Cybersecurity Insiders

Real Talk with CCSPs: An Interview with Panagiotis Soulos

“Cloud is the present, and the future. It affects everything, every day, both in business and our personal lives.” With these words Panagiotis Soulos summarizes his philosophy of why the CCSP credential is important to any cybersecurity professional. Panagiotis holds…

BlackGuard stealer extends its capabilities in new variant

AT&T Alien Labs researchers have discovered a new variant of BlackGuard stealer in the wild, infecting using spear phishing attacks. The malware evolved since its previous variant and now arrives with new capabilities. Key takeaways: BlackGuard steals user sensitive information…

The Human Aspect in Zero Trust Security

Zero trust security has become a buzzword in the cybersecurity world, emphasizing the need for a more robust and reliable security model. While most guides and articles focus on the technical aspects, there is a crucial element often overlooked: the…

Cybersecurity Industry News Review – March 21, 2023

KillNet is bad for your health, TikTok facing further bans, ransomware impacts cancer test results, Russia allegedly increasing its cyberwarfare efforts.   By Joe Fay  Microsoft Demonstrates How KillNet Is Bad for Our Healthcare Sector  Microsoft has highlighted a rise in…

API security: the new security battleground

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  “While defenders pursue the most powerful and advanced…

10 Ways B2B companies can improve mobile security

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Mobile security refers to the technologies and processes…

LATEST CYBERTHREATS AND ADVISORIES – MARCH 24, 2023

By John Weiler   FBI arrests Breached hacking forum leader, smartphones hijacked without any user involvement and 330,000 customers compromised in Australia by a data breach. Here are the latest threats and advisories for the week of March 24, 2023. Threat…

OPINION: Why Perfection is the Enemy of Progress in Cybersecurity

By Muhammad Chbib, CEO of Autobahn Security Is your organization suffering from cybersecurity paralysis? Many businesses are in cybersecurity panic-mode due to the steady stream of alarming news that ‘nobody is safe’ from hackers. While it’s true that all businesses are technically ‘hackable’, it’s…

Cybersecurity Industry News Review – March 28, 2023

By Joe Fay The U.K. writes a cybersecurity prescription for the NHS and for social care, data protection hardware is becoming a big security gap, security specialist MITRE partners up to tackle supply chain security threats, while the E.U. turns…

(ISC)² Listens: Women Working in Cybersecurity

This month, we asked women in the (ISC)² Blog Volunteers group to weigh in on a few questions from their perspective as a female working in cybersecurity. While their experiences in the industry have varied, this group unanimously responded that…

Dridex malware, the banking trojan

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Introduction: Dridex, also known as Cridex or Bugat,…

How often should security audits be?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In today’s digital world, it’s no surprise that…

Source Code of Twitter leaked on GitHub

Twitter issued a public statement stating that parts of its source code were leaked on GitHub and that its officials were trying their best to file a DMCA to take down the leaked content from the web and identify the…

New Report on Current and Emerging Cyber Threats to Healthcare

Health-ISAC, a nonprofit, private sector, member-driven organization, has released its annual cyber threat report on current and emerging threat activity in the healthcare industry, in collaboration with Booz Allen Hamilton Cyber Threat Intelligence. The report provides actionable intelligence to healthcare…

BlackGuard stealer extends its capabilities in new variant

AT&T Alien Labs researchers have discovered a new variant of BlackGuard stealer in the wild, infecting using spear phishing attacks. The malware evolved since its previous variant and now arrives with new capabilities. Key takeaways: BlackGuard steals user sensitive information…

Your Guide to Vulnerability Scanning

Is your organization doing enough to protect its environment from hackers? In 2021, U.S. companies lost nearly $7 billion to phishing scams, malware, malvertising, and other cybercrimes. Experts estimate that by 2025, such schemes will cost businesses worldwide more than…

Vulnerability Management Automation: A Mandate, Not A Choice

Cybercriminals are smarter, faster, and more relentless in their attacks than in times past. Data breaches are a serious threat to organizations, but vulnerability management automation can help reduce the number of incidents businesses face each year. Managing vulnerabilities is…

What is firewall optimization?

Firewall optimization (also known as firewall analysis) is the process of analyzing and adjusting the configuration and policy set of a firewall to improve performance and security. This process involves reviewing and corelating log data and device configurations, identifying potential…

Is Shoulder Surfing a threat to Cybersecurity

For some of you, the phrase “Shoulder Surfing” might be new or you might assume it to be synonymous, but is not in practical. What is Shoulder Surfing? It is nothing but a threat actor trying to gain sensitive information…

Details of ransomware attack on Ferrari and NBA

Ferrari, the luxury car maker has made an official announcement that some of its systems were operating under control of hackers, resulting in a data breach. The company immediately pulled down the compromised servers from the corporate computer network and…

Latest Cyberthreats and Advisories – March 17, 2023

Cybercriminals pounce on SVB collapse, privacy concerns around ChatGPT and the FBI warns of a rise in crypto scams. Here are the latest threats and advisories for the week of March 17, 2023.    By John Weiler  Threat Advisories and Alerts …

Cybersecurity Industry News Review – March 14, 2023

The U.K. Online Safety Bill triggers a security rebuke from WhatsApp, the Czech Republic concerned about TikTok, an international law enforcement effort shuts down the NetWire RAT infrastructure, while a study suggests workforce malaise towards reporting security incidents.   By Joe…

Voices of Women in Cyber – (ISC)² Candidate Nidhi Kannoujia

By Nidhi Kannoujia, (ISC)² Candidate  The cybersecurity industry is a dynamic and promising field that welcomes diverse perspectives. It requires individuals who understand the intricacies of other industries since security is a collective responsibility. While the security industry is embracing diversity,…

Grace Hopper: The Woman Who Changed How We Code and Test

On International Women’s Day, we look back at the legacy of Rear Admiral Grace Hopper, an innovator and trailblazer in software development and standards for testing computer systems and components.  It would be wrong, as we reach International Women’s Day…

Can a Barista Become Your Next SOC Analyst?

Spoiler alert: the obvious answer is not always the correct one! Migrating services, apps and data to the cloud is both promising and challenging. The advantages of scalability, flexibility, reduced operational costs and supporting a hybrid workforce can be eliminated…

Cybersecurity Industry News Review: March 7, 2023

Cybercrime may have less of a gender issue than cybersecurity, LastPass gives attack update, CISA warns on Royal ransomware gang while WHSmith and DISH Network count the cost after both suffer cyber attacks.  Study: Gender No Barrier To Participating In…

YouTube becomes a heaven to malware stealers

Whenever we see a YouTube video that is informative, we tend to go through the description or ‘show more’ feature and have a habit of clicking on the links. What if the link leads us to a website that is…

Latest Cyberthreats and Advisories – March 10, 2023

By John Weiler  Mexico timeshare scams, the DoppelPaymer ransomware gang gets busted and a major data leak rocks Oakland, California. Here are the latest threats and advisories for the week of March 10, 2023.   Threat Advisories and Alerts  FBI Issues…

What We Learned from The Royal Mail Ransomware Chat

By Dave Cartwright, CISSP  In February 2023, something very unusual happened. Following a ransomware attack on Royal Mail International, a division of the U.K.’s (formerly state-owned) mail and parcel delivery service, the negotiation between the firm’s representatives and the LockBit…

10 Ways B2B companies can improve mobile security

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Mobile security refers to the technologies and processes…

Integrating Cybersecurity in UX design

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Integrating Cybersecurity in UX design The digital landscape…

Latest Cyberthreats and Advisories – March 3, 2023

Major U.S. government and corporate breaches, the White House enforces TikTok ban and the NCSC issues zero trust guidance. Here are the latest threats and advisories for the week of March 3, 2023.  Threat Advisories and Alerts  NCSC Publishes Guidance…

AI being used for destruction by China

China is using Artificial Intelligence technology for destruction and the latest developments stand as the best example to explain it in deep. Beijing has started using an AI developed Warship design program that enables the technical guys draw a complex…

Cyber Attack news headlines trending on Google

For the past 1 year or so, a museum is unable to access its artecraft database because of a ransomware attack on the servers of Gloucester City Council. The Phishing email attack took place in the year 2021 and the…

Microsoft to release GPT-4 for AI-Generated Videos

All these days, the media was busy discussing the new AI-based conversational Chatbot ChatGPT. In the coming days, the discussions will shift a bit, towards a similar product named GPT-4, a Large Language Model (LLM) machine learning tool to generate…

Can a Barista Become Your Next SOC Analyst?

Spoiler alert: the obvious answer is not always the correct one! Migrating services, apps and data to the cloud is both promising and challenging. The advantages of scalability, flexibility, reduced operational costs and supporting a hybrid workforce can be eliminated…

Cybersecurity Industry News Review: March 7, 2023

Cybercrime may have less of a gender issue than cybersecurity, LastPass gives attack update, CISA warns on Royal ransomware gang while WHSmith and DISH Network count the cost after both suffer cyber attacks.  Study: Gender No Barrier To Participating In…

TikTok comes up with Project Clover after Project Texas

TikTok, the subsidiary of Chinese Conglomerate Byte Dance, has announced a new data security regime for European users and named it as “Project Clover”. The decision was taken amid building pressure from the lawmakers of the continent who expressed their…

TikTok comes with Project Clover after Project Texas

TikTok, the subsidiary of Chinese Conglomerate Byte Dance, has announced a new data security regime for European users and named it as “Project Clover”. The decision was taken amid building pressure from the lawmakers of the continent who expressed their…

ECB orders for Cyber Attack Stress test on banks

From 2024, the ECB will launch cyber attacks on major noted banks to check their IT infrastructure’s cyber resilience towards sophisticated attacks. Andrea Enria, the head of the ECB, announced the decision Supervisory, after banks operating in Europe observed a…

What is firewall optimization?

Firewall optimization (also known as firewall analysis) is the process of analyzing and adjusting the configuration and policy set of a firewall to improve performance and security. This process involves reviewing and corelating log data and device configurations, identifying potential…

Latest Cyberthreats and Advisories – March 3, 2023

Major U.S. government and corporate breaches, the White House enforces TikTok ban and the NCSC issues zero trust guidance. Here are the latest threats and advisories for the week of March 3, 2023.  Threat Advisories and Alerts  NCSC Publishes Guidance…

Top ransomware news headlines trending on Google

1.) A ransomware gang named Medusa is asking for a ransom of $1,000,000 from the Minneapolis Public Schools and has threatened to leak sensitive details if the victim fails to pay the demanded sum on time. MedusaLocker is a new…

Voices of Women in Cyber – (ISC)² Candidate Nidhi Kannoujia

By Nidhi Kannoujia, (ISC)² Candidate  The cybersecurity industry is a dynamic and promising field that welcomes diverse perspectives. It requires individuals who understand the intricacies of other industries since security is a collective responsibility. While the security industry is embracing diversity,…