Tag: Cybersecurity Insiders

7 key steps to Zero Trust

Read the original article: 7 key steps to Zero Trust This is part 3 of a 3 part blog series My last two blog entries provided some key elements of a Zero Trust Network (ZTN), which focused on the tenets of…

Assess and adapt for resiliency

Read the original article: Assess and adapt for resiliency Admittedly, we are in uncharted territory – what seemed routine a few short weeks ago – commuting to work, going to the gym, or gathering with friends – is now either…

The Bitglass Blog

Read the original article: The Bitglass Blog California is setting the stage for compliance in 2020 with the enactment of the California Consumer Privacy Act (CCPA).The statute that went into effect on the first of January expands the rights of…

Ransomware attack news stories trending on Google

From the past few hours’ news related to Portuguese Multinational Energy Giant Energias De Portugal (EDP) is doing several rounds on Google and it states that the power supplier was targeted by a Ragnar Locker Ransomware attack who stole over…

Can incident response be fun?

Cyber attacks are unfortunately inevitable. It’s important to security harden your networks as much as possible. But your organization must also be prepared for incident response. Effective incident response involves an awareness of various cyber risks and threats, having a…

Slack phishing attacks using webhooks

Background Slack is a cloud-based messaging platform that is commonly used in workplace communications. It is feature-rich, offering additional functionality such as video calling and screen sharing in addition to a marketplace containing thousands of third-party applications and add-ons. Slack…

CloudPassage Response to COVID-19

At CloudPassage we’re keenly aware of the disruption and stress being caused by the COVID-19 outbreak and related quarantine orders. We’re seeing impact across our ecosystem of customers, teams, and other stakeholders worldwide. Communication is critical in situations like this,…

Monero replaces Bitcoin for Sodinokibi Ransomware operators

As Bitcoins and BTC transactions are no more anonymous, those propelling Sodinokibi Ransomware have decided to abandon Bitcoin and switched to Monero Cryptocurrency acceptance. It is already a fact that law enforcement agencies with the help of some technology companies…

Data Breach at San Francisco International Airport

A hacking group that infiltrated into the network of San Francisco’s International Airport in March 2020 is reported to have access login credentials used by employees on two of its websites- SFOConnect.com and SFOConstruction.com. And the interesting part in this…

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others.  Working remotely can be challenging. I can offer some advice about working remotely, as…

The future of cybersecurity for connected cars

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…

Common focal points of DoS attacks

This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks…

The Zero Trust Authorization Core

This is part 2 of a 3 blog series The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust.  One of the tenets mentions how all network flows are to be authenticated…

Stories from the SOC- RIG Exploit Kit

Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange®…

Assess and adapt for resiliency

Admittedly, we are in uncharted territory – what seemed routine a few short weeks ago – commuting to work, going to the gym, or gathering with friends – is now either a daunting task or a non-existent option. This shift…

Zscaler acquiring Cloudneeti

Zscaler, the cloud-based information security platform is all set to acquire Cloudneeti, a cloud security posture management company that allows MSPs to track down misconfigurations across multi-cloud environments. Meaning, it helps users in analyzing and fixing misconfigurations across Amazon Web…

Avast launches Android version Secure Browser

Czech based Multinational Cybersecurity firm Avast has made an official announcement yesterday that it’s Avast Secure Browser which is an encrypted browser for Android OS users is now commercially available. Thus, with the latest declaration, we can conclude that the…

Windows Server 2019 OS hardening

This blog was written by an independent guest blogger. Windows Server 2019 ships and installs with an existing level of hardening that is significantly more secure compared to previous Windows Server operating systems. Gone are the bloat of Xbox integration…

The foundation of a Zero Trust architecture

Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls…

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others.  Working remotely can be challenging. I can offer some advice about working remotely, as…

The Zero Trust Authorization Core

This is part 2 of a 3 blog series The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust.  One of the tenets mentions how all network flows are to be authenticated…

Common focal points of DoS attacks

This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks…

The future of cybersecurity for connected cars

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…

Accenture purchases Revolutionary Security

Accenture has released a statement yesterday that Cybersecurity firm Revolutionary Security is now a part of Accenture Security on an official note. The financial figure involved in the purchase deal is yet to be disclosed. But highly placed sources from…

Stories from the SOC- RIG Exploit Kit

Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange®…

Exploits, vulnerabilities and threat adaptation

Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners.  There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet…

An increase in Cyber Attacks witnessed by Trend Micro

Japan-based Cybersecurity firm Trend Micro has revealed that its Cyber Threat report that at least 8 billion cyber threats were blocked in the first two months of the year 2020. And the enterprise security offering software company has highlighted in…

The foundation of a Zero Trust architecture

Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls…

Common focal points of DoS attacks

This blog was written by an independent guest blogger. Is your company at risk of a Denial of Service (DoS) attack? If so, which areas are particularly vulnerable? Think it’s a crazy question? Think again. In 2020, 16 DDoS attacks…

The Bitglass Blog

California is setting the stage for compliance in 2020 with the enactment of the California Consumer Privacy Act (CCPA).The statute that went into effect on the first of January expands the rights of Californians over their data. It gives the…

Apple Inc acquires AI Voice Startup to improve SIRI

Apple Inc has acquired a Dublin based AI Startup which offers technology that enables 3rd parties to integrate high-quality voice and natural language capabilities into their digital products. Dubbed as Voysis, this conversational Artificial Intelligence platform is said to help…

The future of cybersecurity for connected cars

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others.  Working remotely can be challenging. I can offer some advice about working remotely, as…

Exploits, vulnerabilities and threat adaptation

Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners.  There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet…

The Power of Community to Fight COVID-19 Cyber Threats

Cybercriminals are taking advantage of the fear and uncertainty surrounding the current global health and economic situation as well as sudden shifts and exposures in IT environments to launch COVID-19 related attack campaigns. The bad guys are moving full-steam ahead…

Samsung wins a Mobile Security project from Italy

Samsung SDS, the IT wing of Samsung Group has won a defense mobile security project from Italy in March 2020. Thus, the said Italian project happens to be the first defense project of the South Korean Company which is already…

Stories from the SOC- RIG Exploit Kit

Executive summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. AT&T Alien Labs® Open Threat Exchange®…

Corona-cation? Here’s How to Work From Home Securely

By now, the whole world is feeling the effects of a tiny little troublemaker called SARS-CoV-2 or Coronavirus (or COVID-19; oh so many choices!). Every piece of news, every conversation and certainly every WhatsApp message is fixated on this rapidly…

The foundation of a Zero Trust architecture

Part 1 of a 3 blog series Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls…

The future of cybersecurity for connected cars

Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including…

10 tips for working remotely

We’re all working together to help slow the spread of COVID-19 through new policies and guidelines such as working remotely and socially distancing ourselves from others.  Working remotely can be challenging. I can offer some advice about working remotely, as…

Windows Server 2019 OS hardening

This blog was written by an independent guest blogger. Windows Server 2019 ships and installs with an existing level of hardening that is significantly more secure compared to previous Windows Server operating systems. Gone are the bloat of Xbox integration…

Exploits, vulnerabilities and threat adaptation

Security, whether focused on physical, cyber, operational, or other domains, is an interesting topic that lends itself to considerable debate among practitioners.  There are, however, basic concepts and underpinnings that pervade general security theory. One of the most important, yet…

Stories from the SOC- RIG Exploit Kit

Executive summary AT&T Alien Labs® Open Threat Exchange® (OTX) recently created a pulse for a new threat entitled the RIG Exploit Kit which had been observed distributing ransomware to victim companies across a variety of industry verticals. This exploit was…

How to keep your Work from Home strategy Cyber Secure

As many people across the world are working from home these days to keep their office operations going, hackers are seeing these devices as vulnerable points to infiltrate corporate networks. So, here are some strategies that can make your work…

How to spot a fake app?

This blog was written by an independent guest blogger. There are billions of mobile phone users in the world, and every day, the number increases as people find convenience in the use of smartphones. As the number of smartphone user…

Google tracks down 40000 State-funded Cyber Threats

Google Threat Analysis Group(TAG) has announced that it has tracked down more than 40,000 state-backed cyber attacks on its account holders in 2019. The web search giant claims that the year 2018 witnessed 25% higher cases when compared to last…

Phishing Threats Increase with COVID 19 Outbreak

The recent COVID 19 pandemic has changed the way that businesses are operating around the entire country. Some businesses are forced to temporarily shut down, while others are trying to adjust to the changes of working remote and innovating new and…