Acronis Launches EDR Solution with Potential for AI Integration
Acronis EDR is integrated into its Cyber Protect Cloud solution along with backup and data recovery functionalities Read More
Entro exits stealth with context-based secrets management
Entro, the Israeli cybersecurity company focused on protection for secrets and programmatic access to cloud services and data, has exited stealth with its first-ever product offering...
Microsoft Secure Boot Bug
Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure Boot protections, allowing for the...
Attacker uses the Azure Serial Console to gain access to Microsoft VM
Financially motivated threat actor UNC3944 is using phishing and SIM swapping attacks to take over Microsoft Azure admin accounts and gain access to virtual machines...
Insider threats surge across US CNI as attackers exploit human factors
Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyberthreats in the last three years, according to...
Cyber-Resilience Programs Failing on Poor Visibility
Organizations need a better way to build and assess programs Read More
Navigating the complex world of Cybersecurity compliance
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
US Offers $10m Reward For Alleged Prolific Ransomware Actor
Indictments claim Russian was involved in Babuk, Hive and LockBit Read More
USN-6082-1: EventSource vulnerability
It was discovered that EventSource incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file,...
Security breaches push digital trust to the fore
As digital transactions with customers, employees, suppliers, and other stakeholders grow, digital trustworthiness is set to become one of the most important enterprise-wide initiatives with...