API security: the new security battleground
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Tech Industry Bids to Tackle Cyber-Mercenary Epidemic
New principles designed to disrupt and limit a rapidly growing market Read More
Managing security in the cloud through Microsoft Intune
For many years, the Group Policy feature of Microsoft’s Windows has been the go-to solution for controlling workstations, providing deployment, and in general, making a...
AI-fueled search gives more power to the bad guys
Concerns about the reach of ChatGPT and how easier it may get for bad actors to find sensitive information have increased following Microsoft’s announcement of...
5 cyber threats retailers are facing — and how they’re fighting back
There are many reasons retailers are juicy targets for hackers. They earn and handle tremendous amounts of money, store millions of customer credit card numbers,...
Just 1% of Cloud Permissions Are Actively Used
Microsoft warns of "permissions gap" security threat Read More
Experts Warn of Self-Funding North Korean Group APT43
Mandiant says unit is focused on espionage and crypto theft Read More
CVE-2022-27598
A vulnerability have been reported to affect multiple QNAP operating systems. If exploited, the vulnerability allow remote authenticated users to get secret values. The vulnerabilities...
CVE-2022-27597
A vulnerability have been reported to affect multiple QNAP operating systems. If exploited, the vulnerability allow remote authenticated users to get secret values. The vulnerabilities...
Legacy, password-based authentication systems are failing enterprise security, says study
Authentication-related attacks grew in 2022, taking advantage of outdated, password-based authentication systems, according to a study commissioned by HYPR, a passwordless multifactor authentication (MFA) provider...