QR code phishing also known as ‘Quishing’ is a cyberattack that leverages Quick Response (QR) codes to deceive individuals into revealing sensitive information or taking malicious actions. QR codes are two-dimensional barcodes that can store various types of data, including…
Category: Cybersecurity Insiders
Trending Ransomware News headlines on Google
Investigation Deepens into MGM Resorts Hack and Caesars Entertainment Ransomware Attack Recent developments in the ongoing investigation into the MGM Resorts hack and the Caesars Entertainment ransomware attack have shed new light on the culprits behind these cybercrimes. Law enforcement…
FBI and CISA issue Cyber Alert against Snatch Ransomware
When it comes to the world of cybersecurity, the FBI and CISA have a reputation for issuing timely alerts, especially when the threat severity is high. Their latest warning revolves around the notorious Snatch ransomware-as-a-service gang. In their advisory, the…
Cisco acquires Splunk for $28 billion
Cisco, a prominent player in the networking industry, has recently completed a significant acquisition by purchasing cybersecurity solutions provider Splunk for a substantial sum of $28 billion. This announcement was made public through the company’s PR division, shedding light on…
Data Security in traditional Data Centre vs Cloud Environments
In today’s data-driven world, the importance of data security cannot be overstated. Businesses and organizations are constantly faced with the challenge of safeguarding their sensitive information against evolving cyber threats. Two primary approaches for data storage and management are traditional…
WEBINAR: PCI DSS 4.0 Compliance – Tips and Best Practices to Avoid Last-Minute Panic
Join the webinar ‘PCI DSS 4.0 Compliance – Tips and Best Practices to Avoid Last-Minute Panic‘ live on September 26. While the deadline for compliance with the Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements isn’t until March…
Bringing Authentication Security Out of the Dark Ages
Cyber threats have grown increasingly sophisticated in recent years, with an expanding attack surface, today’s hybrid work environment and new vulnerabilities introduced by the IoT are a few of the challenges. Despite this evolving landscape, most organizations have yet to…
Beyond the firewall: Navigating SaaS security challenges
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction: In today’s digital age, businesses have witnessed…
Cyber Attack on International Criminal Court for arresting Russia Vladimir Putin
In March of this year, the International Criminal Court (ICC) based in The Hague made headlines by issuing an arrest warrant against Russian President Vladimir Putin. The allegations against Putin revolve around accusations of committing atrocities against innocent Ukrainian citizens…
T Mobile app customers experience data security concerns
Users of the T-Mobile App have recently encountered an unsettling phenomenon, with their account information displaying the personal data of other users. This concerning breach includes sensitive information such as credit card details, billing history, physical addresses, credit balances, and…
Eco-hacks: The intersection of sustainability and cyber threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Environmental sustainability is more important than ever before…
Kickstarting a Holistic SaaS Ecosystem Security Program
By Maor Bin, CEO, Adaptive Shield One piece of advice I like to give security professionals is this – it’s often instructive to view cybersecurity from the threat actor’s perspective. In a SaaS world, that means understanding the behavior patterns…
How a data-driven approach to threat exposure can fix ‘the short blanket problem’
By Dr Suleyman Ozarslan, Picus Security Co-founder and VP of Picus Labs Like a short blanket that covers the wearer’s head or feet, but never both at the same time, security teams can only dedicate their time, money, and resources…
AT&T Cybersecurity serves as critical first responder during attack on municipality
Earlier this year, analysts in the AT&T Cybersecurity Managed Threat Detection and Response (MTDR) security operations center (SOC) were alerted to a potential ransomware attack on a large municipal customer. The attack, which was subsequently found to have been carried…
CrowdStrike acquires Bionic
Bionic, a pioneering provider of Application Security Posture Management (ASPM) solutions, is celebrating a significant development as it becomes an integral part of CrowdStrike’s talented team. The acquisition of Bionic by CrowdStrike, a leading cybersecurity solutions company, has been completed…
Effective 7 Responses that should be given by CEOs and CTOs during a Cyber Attack
In the face of a cyber attack targeting a company’s IT infrastructure, the world expects swift and effective responses from its CEOs and CTOs to mitigate risks and minimize losses. However, many find themselves in a state of panic during…
Mobile security challenges in work from home environments
In recent years, the global workforce has witnessed a significant shift towards remote work, catalyzed by the COVID-19 pandemic. This transformation has led to a surge in the use of mo-bile devices as essential tools for work-related tasks. While the…
Resilient networks: Building blocks of modern Cybersecurity architecture
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s interconnected digital landscape, where data flows…
Enea Unveils Qosmos Threat Detection SDK to Boost Network Security
As the networking landscape rapidly shifts with data, applications, and infrastructure migrating to the cloud, Enea, a leader in telecom and cybersecurity, has launched its Qosmos Threat Detection SDK. This SDK addresses the limitations of conventional intrusion detection systems (IDS),…
Unofficial digital IDs – what are the risks?
Digital identification has rapidly become an integral part of our day-to-day lives, simplifying processes for both individuals and businesses. What was once considered technology exclusive to “tech-savvy digital natives” has now become more mainstream, with large parts of the population…