Tag: Cybersecurity Insiders

Lung Cancer detection possible 10 Years prior with AI

Lung cancer is a dangerous and contagious disease that spreads throughout the body quickly and is not easy to detect in its early stages. However, thanks to the technology of artificial intelligence-enabled machine learning tools, detecting lung cancer is now…

What is offensive Cyber Capabilities

In recent years, the term “offensive cyber capabilities” has become increasingly common in discussions around national security and military strategies. Offensive cyber capabilities refer to the ability of a nation or organization to launch cyber attacks on other countries, groups,…

Understanding the Different Types and How to Detect Them

Spyware is a type of malicious software designed to gather data from a computer system without the user’s knowledge or consent. This can include sensitive information such as usernames, passwords, and banking details, which can then be used for fraudulent…

How Can You Identify and Prevent Insider Threats?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  If cyber threats feel like faceless intruders, you’re…

The Double-edged Sword of Hybrid Work

By Mishel Mejibovski, Head of Operations and Strategy, SURF Security While some companies insist on going back to their original work practices and are forcing their employees back into the office, many others have realized the benefits of hybrid work…

Get ready for RSA 2023: Stronger Together

Going to RSA next week? If you don’t know, it’s a huge cybersecurity conference held at Moscone Center in San Francisco, CA. If you’re going, please stop by the AT&T Cybersecurity booth and check us out. It’s at #6245 in…

Pillars of Threat Blocking-as-a-Service

By Pat McGarry, CTO of ThreatBlockr There are two indisputable facts about the cybersecurity industry right now. One, we are still in the middle of a massive staffing crisis. Two, one of the biggest drivers of this staffing crisis is…

Is it time to move to a Passwordless future

As data breaches and cyber attacks continue to rise, the traditional method of securing online accounts using passwords is becoming increasingly ineffective. Hackers can easily crack simple and commonly used passwords, or even use social engineering tactics to trick users…

Cyber Attack news headlines trending on Google

CommScope, an American company that is in the business of providing network infrastructure, was reportedly hit by a ransomware attack. Afterward, cybercriminals leaked data of thousands of the company’s employees onto the dark web, including social security numbers and bank…

E-mail header analysis

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  What is an e-mail? E-mail, also referred to…

LockBit Ransomware gang focusing on MacOS

For the first time in the history of Apple Inc, a notorious ransomware-spreading gang seems to have shifted its focus to MacOS-loaded laptops. The LockBit Ransomware Group has now developed encryptors targeting Macs, thus extending their crimes from Windows, Linux,…

WhatsApp introduces new mobile security features

WhatsApp, owned by Facebook, has introduced three new account protection features to enhance the security and privacy of its users, in line with current expectations. These features, which will be rolled out in a month, will help prevent users from…

How reliable are Cloud based Security solutions

Cloud-based security solutions have become increasingly popular in recent years, as more and more businesses are moving their operations to the cloud. Cloud-based security solutions are designed to provide businesses with a reliable and cost-effective way to secure their digital…

API security: the new security battleground

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  “While defenders pursue the most powerful and advanced…

Dridex malware, the banking trojan

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Introduction: Dridex, also known as Cridex or Bugat,…

How Can You Identify and Prevent Insider Threats?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  If cyber threats feel like faceless intruders, you’re…

How often should security audits be?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In today’s digital world, it’s no surprise that…

The Security Risks of ChatGPT in an Enterprise Environment

As artificial intelligence (AI) technologies become more prevalent in enterprise environments, chatbots like ChatGPT are gaining popularity due to their ability to assist in customer service and support functions. However, while these chatbots offer numerous benefits, there are also significant…

BlackGuard stealer extends its capabilities in new variant

AT&T Alien Labs researchers have discovered a new variant of BlackGuard stealer in the wild, infecting using spear phishing attacks. The malware evolved since its previous variant and now arrives with new capabilities. Key takeaways: BlackGuard steals user sensitive information…

E-mail header analysis

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  What is an e-mail? E-mail, also referred to…

The Top Challenges Faced by CISOs in 2023

As the world continues to face unprecedented cyber threats, Chief Information Security Officers (CISOs) are facing a growing number of challenges in their roles. In 2023, these challenges are likely to increase, and CISOs will have to be well-equipped to…

(ISC)² Supports Cyber Newcomers

With more than 14,000 new Certified in Cybersecurity members joining (ISC)² last year and an additional 180,000+ Candidates gearing up to earn their first certification, (ISC)² will be supporting these cyber newcomers every step of the way.   Recently, the…

Latest Cyberthreats and Advisories – March 31, 2023

By John Weiler  Microsoft patches the “aCropalypse” vulnerability, ChatGPT leaks users’ billing information and the Latitude Financial breach expands to 14 million records. Here are the latest threats and advisories for the week of March 31, 2023. Threat Advisories and…

New CISSP Exam Registration Process for 2023

Looking to earn your (ISC)² CISSP certification? Make sure you follow these updated steps to register for your exam. Here is how you can register for the CISSP exam: Log in to your account at www.isc2.org and visit the Register…

LATEST CYBERTHREATS AND ADVISORIES – APRIL 7, 2023

The U.S. government takes down another dark web forum, Western Digital suffers a cyberattack and the fastest acting ransomware to date. Here are the latest threats and advisories for the week of April 7, 2023.   By John Weiler  Threat Advisories…

Most commonly used PINs putting smart phones to cyber risks

In today’s world, almost everyone owns a smartphone. In fact, it has become a necessity rather than a materialistic want. To secure the device from fraudulent access, mobile operating system manufacturers are coming up with various security features, among which…

Tesla staff sharing in-car customer images

Do you own a Tesla electric vehicle? If yes, then this news piece could be of interest to you. According to research conducted by Reuters, private recordings of individual Tesla car customers are being shared by former employees via chat…

API security: the new security battleground

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  “While defenders pursue the most powerful and advanced…

AI Chatbot leads to a married man’s suicide

In a first-of-its-kind incident, a married man and father of two children was drawn towards suicide by a talking AI Chatbot named ‘Eliza’. The topic for discussion between the man and the machine was global warming fears, which sounds strange,…

North Korea dedicates a hacking group to fund cyber crime

North Korea has established a hacking group named APT43 to fund its cybercrime activities, aimed at advancing Pyongyang’s geopolitical interests. According to a study conducted by se-curity firm Mandiant, the group has been in operation since 2018 and has now…

How to defend lean security teams against cyber threats

In today’s digital age, companies face an ever-increasing number of cyber threats. The reality is that no organization is immune to cyber attacks, regardless of its size or industry. However, lean security teams, which are commonplace in smaller companies and…

How Can You Identify and Prevent Insider Threats?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  If cyber threats feel like faceless intruders, you’re…

Cybersecurity Fatigue: Its Impact and Solutions

Cybersecurity fatigue is genuine, and hackers are benefiting from it. The constant pressure to frequently update the software and stay precautionary of fraudulent emails is exhausting. Therefore, even minor mistakes can have critical consequences. Cybercrime risk is rising, security vulnerabilities…

Dridex malware, the banking trojan

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Introduction: Dridex, also known as Cridex or Bugat,…

Jobs created using ChatGPT

With the advent of advanced technology, there has been an explosion of innovative solutions that have revolutionized various industries. One such technology that has gained widespread adoption is ChatGPT – an artificial intelligence-powered chatbot that has been created by OpenAI.…

How often should security audits be?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In today’s digital world, it’s no surprise that…

What are the Mobile App Security Best Practices

Mobile applications have become an essential part of our daily lives, and they are used for a variety of purposes such as communication, banking, shopping, and entertainment. However, with the increasing use of mobile applications, the risk of security breaches…

After Italy, Germany to issue ban on the ChatGPT use

ChatGPT released by Microsoft owned OpenAI has been slapped with a temporary ban by Italy government agencies due to data security concerns. Now, on Monday i.e. on April 3rd of the year 2023, Germany Commissioner for data protection told Handelsblatt…

Western Digital shuts systems due to Cyber Attack

A cyber attack launched and identified on March 26th of this year has triggered the incident response teams of Western Digital (WD) to take appropriate steps to mitigate the cyber risks of the incident. And the data storage company admitted…

Three big Cybersecurity fears of TikTok answered

After hearing a lot from the US government over national security fears, TikTok seems to have come up with answers to the three big cybersecurity questions that the app is facing from international media and governments across the world. Regarding…

LATEST CYBERTHREATS AND ADVISORIES – MARCH 24, 2023

By John Weiler   FBI arrests Breached hacking forum leader, smartphones hijacked without any user involvement and 330,000 customers compromised in Australia by a data breach. Here are the latest threats and advisories for the week of March 24, 2023. Threat…

Cybersecurity Industry News Review – March 28, 2023

By Joe Fay The U.K. writes a cybersecurity prescription for the NHS and for social care, data protection hardware is becoming a big security gap, security specialist MITRE partners up to tackle supply chain security threats, while the E.U. turns…

Business Wire’s Website is Currently Unavailable

Business Wire We apologize for the inconvenience. Our team is working to resolve the issue. If you have questions or need to submit a news release, please contact your local Business Wire bureau: US: +1.888.381.WIRE(9473) Australia: +61 2.9004.7015 Canada: +1.416.593.0208…

PRODUCT REVIEW: Trend Micro Cloud One

As part of the Cybersecurity Insiders Product Review series, we are today reviewing Trend Cloud One, a comprehensive and powerful cloud security platform for developers, security teams, and businesses. Trend Micro Cloud One’s integrated platform approach considers cloud projects and…

Latest Cyberthreats and Advisories – March 31, 2023

By John Weiler  Microsoft patches the “aCropalypse” vulnerability, ChatGPT leaks users’ billing information and the Latitude Financial breach expands to 14 million records. Here are the latest threats and advisories for the week of March 31, 2023. Threat Advisories and…

Women in Cybersecurity – History to Today

This March, Women’s History Month, we shared the legacy of Grace Hopper and her trailblazing innovations in software development and computing, highlighted the must-watch webinars by in cybersecurity and met with cyber newcomer and (ISC)² Candidate Nidhi Kannoujia on the…

Real Talk with CCSPs: An Interview with Panagiotis Soulos

“Cloud is the present, and the future. It affects everything, every day, both in business and our personal lives.” With these words Panagiotis Soulos summarizes his philosophy of why the CCSP credential is important to any cybersecurity professional. Panagiotis holds…

BlackGuard stealer extends its capabilities in new variant

AT&T Alien Labs researchers have discovered a new variant of BlackGuard stealer in the wild, infecting using spear phishing attacks. The malware evolved since its previous variant and now arrives with new capabilities. Key takeaways: BlackGuard steals user sensitive information…