Tag: Cybersecurity Insiders

Cerber Ransomware hackers target Atlassian Confleunce servers

A recent study conducted by the cybersecurity firm Rapid7 has revealed that multiple ransomware groups are actively targeting vulnerabilities in Atlassian Confluence Servers. One such criminal group, responsible for the distribution of Cerber Ransomware, is exploiting these vulnerabilities in Confluence…

Palo Alto Networks acquired Talon Cyber Security

Israel-based browser-based startup Talon Cyber Security has recently been acquired by the networking giant Palo Alto Networks. Palo Alto Networks has been actively integrating new technology into its existing products. Remarkably, this acquisition was not hindered by the ongoing conflict…

Cyber Attack news headlines trending on Google

1. Shimano, a cycle component manufacturing company, fell victim to a ransomware attack in which hackers managed to steal approximately 4.5 terabytes of sensitive business-related information. The incident is believed to be the work of the LockBit Ransomware gang and…

QR Codes are a Security Blindspot

By Mary Blackowiak, Director of Product Management and Development, AT&T Business Whether at the grocery store, eating dinner at a restaurant, locating a gate at the airport, gaining entry to an event, or even watching TV—QR codes are popping up…

Ransomware hits Infosys, Ace Hardware and Henry Schein

1.) A recent cyber attack targeted Infosys subsidiary, Infosys McCamish Systems, which was initially detected last week but only officially acknowledged this Tuesday. According to sources within our Cybersecurity Insiders, this incident appears to involve a ransomware variant, with further…

What is data security posture management

Data Security Posture Management (DSPM) is a comprehensive approach and set of tools and practices that organizations use to assess, manage, and improve their data security posture. It involves monitoring, evaluating, and enhancing data security measures to ensure the confidentiality,…

10 ways to know your smart phone has spying malware

Numerous world leaders have expressed concerns regarding espionage-related malware being surreptitiously planted on their personal devices by their adversaries. This clandestine practice aims to gather classified information or monitor their activities. Apple Inc. issued a statement yesterday, urging iPhone users…

Trending Cybersecurity News headlines on Google

Apple dismisses political controversy over its security alert Apple Inc has released a statement acknowledging attempts by state-sponsored actors to breach the devices of its users in various countries, including India. However, the company distanced itself from the ongoing espionage…

Top Cloud Misconfigurations Leading to Cloud Data Breaches

As organizations increasingly migrate their operations to the cloud, the security of their cloud infrastructure becomes a paramount concern. While cloud services offer numerous benefits, mis-configurations in cloud environments can inadvertently expose sensitive data and lead to catastrophic breaches. In…

Generative AI and Cybersecurity in a State of Fear, Uncertainty and Doubt

by Jason Rebholz, Chief Information Security Officer, Corvus Insurance Organizations are finding innumerable ways to incorporate generative artificial intelligence (GenAI) and large language model (LLM) technologies to speed up processes, gain efficiencies, eliminate repetitive, low-value tasks and enhance knowledge, among other uses.…

Generative AI: The Unseen Insider Threat

by Steve Povolny, Director, Security Research at Exabeam Artificial intelligence, or AI, as it’s commonly known, is all the rage these days. The widespread availability of free generative AI tools like ChatGPT has allowed the technology to be embraced by…

Navigating Security, Business Continuity, Through a Downturn

Steve Durbin, Chief Executive, Information Security Forum With inflationary pressures mounting and downturn fears hovering, it’s natural for organizations to scale back on their overall spending, including cybersecurity. After consecutive years of double-digit growth, cybersecurity spending appears to be slowing down mainly because CISOs…

The Evolution of Financial Fraud

By Greg Woolf, CEO of FiVerity The marriage of fraud and artificial intelligence (AI) is lethal. Right now, fraudsters are upping their games, leveraging new and innovative tools such as ChatGPT and Generative AI to wreak havoc on the financial…

India witnesses biggest data breach of Aadhaar details via ICMR

Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There are alarming reports suggesting that the personal information of approximately 815 million citizens was illicitly accessed by hackers through the…

Ransomware news trending on Google

1.) A ransomware group known as “Play” has recently issued a concerning statement. They have threatened to release the personal details of more than 8,600 Dallas County employees on the dark web unless their ransom demands are met. To add…

Google App turns into malware for many on Smart Phones

The Google app and its synchronized applications, including Maps and Gmail, offer a world of possibilities to users. However, a peculiar situation has arisen, with certain smartphones identifying the Google app as potential malware and warning users against its usage.…

Privacy in the Age of AI: Strategies for Protecting Your Data

Artificial intelligence is no longer just the stuff of science fiction; generative AI tools are seeing massive adoption rates. Unsurprisingly, the marketing and advertising industry has embraced AI-driven tools with the most enthusiasm. According to the latest data from January…

Email Security in the Remote Work Era

“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In…

VMware customers anxious about ransomware threats

VMware has recently made headlines on Google News due to ransomware attacks targeting the company. This development has left its customers feeling uneasy and prompted them to search for alternative products that are more secure. The increasing licensing costs have…

A Roadmap to Launch Your Career in Network Security

In today’s digital age, the importance of network security has never been greater. With cyber threats evolving at an alarming pace, skilled professionals in the field of network security are in high demand. If you’re interested in protecting critical data,…

Canada govt websites disrupted by Cyber Attacks from India

Numerous government websites in Canada experienced performance issues and error messages due to a cyber-attack orchestrated by the India Cyber Force. Federal intelligence agencies have expressed concerns that these attacks could escalate in severity over the upcoming weeks, coinciding with…

Digital identity: Dispelling the myths

Digital identities have had a significant impact on the way we interact, transact, and explore the world around us. However, there is still a limited understanding of what they are and the benefits they have. In our latest piece for Computer…

Cyber Attack paralysis IT operations at Volkswagen

Volkswagen (VW) manufacturing operations in Germany faced a significant disruption due to a cyberattack that targeted its IT infrastructure. Suspicions have arisen, pointing towards proactive Russian hackers, possibly in response to Germany’s vocal support for Ukraine and its reduced reliance…

Johnson Controls hit by Dark Angels Ransomware

The Dark Angels ransomware gang, active since May 2022, has reportedly set its sights on VMware ESXi servers within the premises of Johnson Controls International (JCI). The cyberattack initially targeted JCI’s Asian offices and subsequently spread to several subsidiary brands,…

Lawsuit against MGM and Ceasars Entertainment Ransomware Attack

A lawsuit has been initiated against two prominent gaming entities due to their failure to safeguard the personal identifiable information of their customers, resulting in a substantial potential penalty, possibly amounting to millions of dollars. The legal action revolves around…

Cyber Attacks Arising from Microsoft Office Software

In today’s digital age, Microsoft Office has become a staple in offices and homes worldwide, facilitating communication, productivity, and document management. However, this widespread usage has also made MS Office software a prime target for cyber-criminals. Cyber attacks arising from…

Email inboxes are vulnerable to sophistication driven cyber attacks

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious…

Trending Ransomware News headlines on Google

Investigation Deepens into MGM Resorts Hack and Caesars Entertainment Ransomware Attack Recent developments in the ongoing investigation into the MGM Resorts hack and the Caesars Entertainment ransomware attack have shed new light on the culprits behind these cybercrimes. Law enforcement…

FBI and CISA issue Cyber Alert against Snatch Ransomware

When it comes to the world of cybersecurity, the FBI and CISA have a reputation for issuing timely alerts, especially when the threat severity is high. Their latest warning revolves around the notorious Snatch ransomware-as-a-service gang. In their advisory, the…

Cisco acquires Splunk for $28 billion

Cisco, a prominent player in the networking industry, has recently completed a significant acquisition by purchasing cybersecurity solutions provider Splunk for a substantial sum of $28 billion. This announcement was made public through the company’s PR division, shedding light on…

Data Security in traditional Data Centre vs Cloud Environments

In today’s data-driven world, the importance of data security cannot be overstated. Businesses and organizations are constantly faced with the challenge of safeguarding their sensitive information against evolving cyber threats. Two primary approaches for data storage and management are traditional…

Bringing Authentication Security Out of the Dark Ages

Cyber threats have grown increasingly sophisticated in recent years, with an expanding attack surface, today’s hybrid work environment and new vulnerabilities introduced by the IoT are a few of the challenges. Despite this evolving landscape, most organizations have yet to…

T Mobile app customers experience data security concerns

Users of the T-Mobile App have recently encountered an unsettling phenomenon, with their account information displaying the personal data of other users. This concerning breach includes sensitive information such as credit card details, billing history, physical addresses, credit balances, and…

Kickstarting a Holistic SaaS Ecosystem Security Program

By Maor Bin, CEO, Adaptive Shield One piece of advice I like to give security professionals is this – it’s often instructive to view cybersecurity from the threat actor’s perspective. In a SaaS world, that means understanding the behavior patterns…

CrowdStrike acquires Bionic

Bionic, a pioneering provider of Application Security Posture Management (ASPM) solutions, is celebrating a significant development as it becomes an integral part of CrowdStrike’s talented team. The acquisition of Bionic by CrowdStrike, a leading cybersecurity solutions company, has been completed…

Unofficial digital IDs – what are the risks?

Digital identification has rapidly become an integral part of our day-to-day lives, simplifying processes for both individuals and businesses. What was once considered technology exclusive to “tech-savvy digital natives” has now become more mainstream, with large parts of the population…

Microsoft 38TB AI Data Leak details

In July 2020, Microsoft (MS) launched its dedicated Artificial Intelligence (AI) research division, initially envisioned to harness vast datasets for its search engine. The venture seemed promising, but a recent revelation by security researchers from WIZ serves as a stark…

Cloud environments blamed for security vulnerabilities

Fascinating research carried out by Palo Alto Networks Unit 42 has unveiled that a staggering 80% of organizations point the finger at cloud environments for the majority of security challenges they face within their enterprise landscapes. According to the Unit…

Top blockchain Cybersecurity threats to watch out for

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Approximately 57 cryptocurrency thefts occurred in just the first…

2024 Cybersecurity Excellence Awards Now Open

The 2024 CYBERSECURITY EXCELLENCE AWARDS are now open for nominations. In the complex and dynamic world of cybersecurity, excellence often goes unnoticed. That’s where the Cybersecurity Excellence Awards come in. This isn’t just another awards program – it’s an opportunity…

PRODUCT REVIEW: ISC2 CGRC Certification

The demand for governance, risk, and compliance (GRC) professionals is on the rise due to increasing regulatory requirements, the constantly evolving cybersecurity landscape, and the significant financial and reputational risks associated with non-compliance or security breaches. To safeguard their assets,…

TikTok slapped with €345m Child Privacy penalty by EU

The European Union has imposed a substantial €345 million fine on the popular video-sharing platform TikTok for its failure to adequately protect children’s data. The penalty comes following a notice from Ireland’s Data Protection Commission (DPC), an EU data privacy…

Top 5 Search Engines for Cybersecurity Research

In the ever-evolving landscape of cybersecurity, staying updated with the latest threats, vulnerabilities, and research findings is crucial. One of the most effective ways to gather information on cybersecurity is by using search engines. However, not all search engines are…

Apple says better keep data out of cloud

Apple’s recent Wonderlust event has garnered significant attention, particularly in the realm of digital viewership statistics. However, one noteworthy message from the tech giant has reverberated across the globe: safeguard your data by keeping it out of the cloud. Apple,…

Cyber Attack news headlines trending on Google

1. Cyber Attack Steals $400,000 from Diocese of Virginia Trust Fund In a startling revelation, a cyber attack in late 2022 has resulted in the theft of a trust fund worth $400,000 associated with the Diocese of Virginia. The incident…

Getting ready for a post-quantum world

Quantum computers are changing the cryptography rules Under Data Encryption, the CISA Zero Trust Maturity Model v2.0 cites the criticality of “cryptographic agility” on the third (out of four) level of maturity. Cryptographic agility is the ability to change the…

Two Ransomware Attack Stories currently trending on Google

In a recent development, Greater Manchester Police (GMP) officers have fallen victim to a highly sophisticated cyberattack. This attack targeted a technology provider and resulted in the unauthorized exposure of information including ranks, photographs, the precise geolocation where the photos…

Details of Airbus Cyber Attack and Implications

Airbus, a renowned leader in the aerospace industry, has recently found itself at the center of a highly sophisticated cyber-attack, sending shockwaves through the cybersecurity landscape. This breach has exposed a trove of sensitive information, including the personal details of…

Future forward cyber

For organizations of all sizes, cyber consistently earns a place on the agenda, becoming a focal point for business-critical initiatives and investments. Today, cyber means business, and it isn’t challenging to overstate the importance of cyber as a foundational and…

China’s Move Towards Automated Data Security Compliance

In an era marked by persistent insider threats, espionage activities, malicious software attacks, and escalating cyberwarfare, China is contemplating a gradual shift towards replacing human oversight with cutting-edge technology to enforce critical data security regulations. Under the banner of national…