Category: Cybersecurity Insiders

Microsoft 38TB AI Data Leak details

In July 2020, Microsoft (MS) launched its dedicated Artificial Intelligence (AI) research division, initially envisioned to harness vast datasets for its search engine. The venture seemed promising, but a recent revelation by security researchers from WIZ serves as a stark…

Cloud environments blamed for security vulnerabilities

Fascinating research carried out by Palo Alto Networks Unit 42 has unveiled that a staggering 80% of organizations point the finger at cloud environments for the majority of security challenges they face within their enterprise landscapes. According to the Unit…

Top blockchain Cybersecurity threats to watch out for

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Approximately 57 cryptocurrency thefts occurred in just the first…

2024 Cybersecurity Excellence Awards Now Open

The 2024 CYBERSECURITY EXCELLENCE AWARDS are now open for nominations. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That’s where the Cybersecurity Excellence Awards come in. This isn’t just another awards program – it’s an opportunity…

PRODUCT REVIEW: ISC2 CGRC Certification

The demand for governance, risk, and compliance (GRC) professionals is on the rise due to increasing regulatory requirements, the constantly evolving cybersecurity landscape, and the significant financial and reputational risks associated with non-compliance or security breaches. To safeguard their assets,…

TikTok slapped with €345m Child Privacy penalty by EU

The European Union has imposed a substantial €345 million fine on the popular video-sharing platform TikTok for its failure to adequately protect children’s data. The penalty comes following a notice from Ireland’s Data Protection Commission (DPC), an EU data privacy…

Top 5 Search Engines for Cybersecurity Research

In the ever-evolving landscape of cybersecurity, staying updated with the latest threats, vulnerabilities, and research findings is crucial. One of the most effective ways to gather information on cybersecurity is by using search engines. However, not all search engines are…

Apple says better keep data out of cloud

Apple’s recent Wonderlust event has garnered significant attention, particularly in the realm of digital viewership statistics. However, one noteworthy message from the tech giant has reverberated across the globe: safeguard your data by keeping it out of the cloud. Apple,…

Cyber Attack news headlines trending on Google

1. Cyber Attack Steals $400,000 from Diocese of Virginia Trust Fund In a startling revelation, a cyber attack in late 2022 has resulted in the theft of a trust fund worth $400,000 associated with the Diocese of Virginia. The incident…

Getting ready for a post-quantum world

Quantum computers are changing the cryptography rules Under Data Encryption, the CISA Zero Trust Maturity Model v2.0 cites the criticality of “cryptographic agility” on the third (out of four) level of maturity. Cryptographic agility is the ability to change the…

Two Ransomware Attack Stories currently trending on Google

In a recent development, Greater Manchester Police (GMP) officers have fallen victim to a highly sophisticated cyberattack. This attack targeted a technology provider and resulted in the unauthorized exposure of information including ranks, photographs, the precise geolocation where the photos…