The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today’s digital landscape, businesses are embracing the…
Category: Cybersecurity Insiders
Microsoft 38TB AI Data Leak details
In July 2020, Microsoft (MS) launched its dedicated Artificial Intelligence (AI) research division, initially envisioned to harness vast datasets for its search engine. The venture seemed promising, but a recent revelation by security researchers from WIZ serves as a stark…
Insider Threats: Why Human Error Is Your Biggest Cybersecurity Risk (and How to Address It)
With autumn leaves falling and September firmly underway, the time has come to note and reflect on National Insider Threat Awareness Month. The month acts as a reminder of the importance of taking steps to avoid insider threats across every…
Cloud environments blamed for security vulnerabilities
Fascinating research carried out by Palo Alto Networks Unit 42 has unveiled that a staggering 80% of organizations point the finger at cloud environments for the majority of security challenges they face within their enterprise landscapes. According to the Unit…
Top blockchain Cybersecurity threats to watch out for
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Approximately 57 cryptocurrency thefts occurred in just the first…
2024 Cybersecurity Excellence Awards Now Open
The 2024 CYBERSECURITY EXCELLENCE AWARDS are now open for nominations. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That’s where the Cybersecurity Excellence Awards come in. This isn’t just another awards program – it’s an opportunity…
PRODUCT REVIEW: ISC2 CGRC Certification
The demand for governance, risk, and compliance (GRC) professionals is on the rise due to increasing regulatory requirements, the constantly evolving cybersecurity landscape, and the significant financial and reputational risks associated with non-compliance or security breaches. To safeguard their assets,…
Unmasking antiforensics techniques: Strategies for effective defense
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction: In the world of digital forensics, where…
Scattered Spider managed MGM Resort Network Outage brings $8m loss daily
In recent weeks, Scattered Spider, a highly active hacking group, has made headlines by targeting more than 130 organizations, with the number of victims steadily increasing. Prominent organizations, including Epic Games, Riot Games, AT&T, HubSpot, TTEC, Best Buy, Evernote, Microsoft,…
TikTok slapped with €345m Child Privacy penalty by EU
The European Union has imposed a substantial €345 million fine on the popular video-sharing platform TikTok for its failure to adequately protect children’s data. The penalty comes following a notice from Ireland’s Data Protection Commission (DPC), an EU data privacy…
Top 5 Search Engines for Cybersecurity Research
In the ever-evolving landscape of cybersecurity, staying updated with the latest threats, vulnerabilities, and research findings is crucial. One of the most effective ways to gather information on cybersecurity is by using search engines. However, not all search engines are…
Apple says better keep data out of cloud
Apple’s recent Wonderlust event has garnered significant attention, particularly in the realm of digital viewership statistics. However, one noteworthy message from the tech giant has reverberated across the globe: safeguard your data by keeping it out of the cloud. Apple,…
Cyber Attack news headlines trending on Google
1. Cyber Attack Steals $400,000 from Diocese of Virginia Trust Fund In a startling revelation, a cyber attack in late 2022 has resulted in the theft of a trust fund worth $400,000 associated with the Diocese of Virginia. The incident…
How Zero-Day Attacks Are Escalating the Cyber Threat Landscape
In the ever-evolving landscape of cybersecurity, the term “zero-day attack” strikes fear into the hearts of both individuals and organizations alike. These attacks are notorious for their stealthy nature and the havoc they can wreak. As technology advances, so do…
The cat and mouse game: Staying ahead of evolving cybersecurity threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cybersecurity threats refer to malicious activities conducted over…
7 Steps to Implement Secure Design Patterns – A Robust Foundation for Software Security
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies In an era where data breaches and cybersecurity attacks are rampant, secure software design has become not only a matter of technical proficiency, but a crucial component of…
Getting ready for a post-quantum world
Quantum computers are changing the cryptography rules Under Data Encryption, the CISA Zero Trust Maturity Model v2.0 cites the criticality of “cryptographic agility” on the third (out of four) level of maturity. Cryptographic agility is the ability to change the…
Two Ransomware Attack Stories currently trending on Google
In a recent development, Greater Manchester Police (GMP) officers have fallen victim to a highly sophisticated cyberattack. This attack targeted a technology provider and resulted in the unauthorized exposure of information including ranks, photographs, the precise geolocation where the photos…
MGM Hotel Resorts Cyber attack by Scattered Spider or BlackCat Ransomware
On Monday, September 11th, 2023, MGM Resorts and Hotels, a colossal entity valued at over $14 billion, found itself in the crosshairs of a meticulously orchestrated cyber assault, effectively crippling the casino operator’s operations. According to an online source, this…
Keeping cybersecurity regulations top of mind for generative AI use
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Can businesses stay compliant with security regulations while…