SASE in the spotlight as businesses prioritize edge network security
Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation across cloud and infrastructure, applications, and...
BotenaGo strikes again – malware source code uploaded to GitHub
Executive summary In November 2021, AT&T Alien Labs™ first published research on our discovery of new malware written in the open-source programming language Golang. The...
BotenaGo strikes again – malware source code uploaded to GitHub
Executive summary In November 2021, AT&T Alien Labs™ first published research on our discovery of new malware written in the open-source programming language Golang. The...
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors There’s been a 29% increase in the number of vulnerabilities exploited by ransomware groups to...
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors
Experts Reveals 29% Surge in Bugs Used by Ransomware Actors There’s been a 29% increase in the number of vulnerabilities exploited by ransomware groups to...
Government Trials Effort to Make Bug Scanning Easier
Government Trials Effort to Make Bug Scanning Easier The UK’s leading cybersecurity agency has revealed details of a new initiative designed to make it easier...
Government Trials Effort to Make Bug Scanning Easier
Government Trials Effort to Make Bug Scanning Easier The UK’s leading cybersecurity agency has revealed details of a new initiative designed to make it easier...
Home Working Drives 44% Surge in Insider Threats
Home Working Drives 44% Surge in Insider Threats Insider threats cost organizations an average of over $15m annually to remediate last year, with stolen credentials a...
Home Working Drives 44% Surge in Insider Threats
Home Working Drives 44% Surge in Insider Threats Insider threats cost organizations an average of over $15m annually to remediate last year, with stolen credentials a...
How to defend Windows networks against destructive cyberattacks
The Russian cyberattacks on Ukrainian organizations reminds us that the attacker isn’t always looking to steal data or extort money. Sometimes they just want to...