News

  • Navigating the Cybersecurity landscape: A deep dive into effective SIEM strategies

     The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Comprehending and effectively addressing cybersecurity threats is paramount to organizational security. As artificial intelligence continues to evolve, how companies respond to cybersecurity threats…

    Read More

  • Securing Perimeter Products Must Be a Priority, Says NCSC

    UK’s National Cyber Security Centre warns of dangers of insecure perimeter products Read More

    Read More

  • Drugs and Cybercrime Market Busted By German Cops

    German police have dismantled the country’s largest underground marketplace: Crimemarket Read More

    Read More

  • Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered

    Paleontologists have discovered a 183-million-year-old species of vampire squid. Prior research suggests that the vampyromorph lived in the shallows off an island that once existed in what is now the heart of the European mainland. The research team believes that the remarkable degree of preservation of this squid is due to unique conditions at the…

    Read More

  • Rise in Deceptive PDF: The Gateway to Malicious Payloads

    Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF files. Malware is not solely sourced from dubious websites or downloads; certain instances of malware may reside within apparently harmless emails, particularly within the PDF file attachments accompanying them. The subsequent trend…

    Read More

  • Someone is hacking 3D printers to warn owners of a security flaw

    Someone is hacking 3D printers to warn owners of a security flaw Do you have an Anycubic Kobra 2 Pro/Plus/Max 3D printer? Did you know it has a security vulnerability? If you answered “yes” to both those questions, then chances are that I can guess just how you found out your 3D printer was vulnerable…

    Read More

  • Biden Warns Chinese Cars Could Steal US Citizens’ Data

    President Biden warned that connected vehicles built in China could be used to steal sensitive data of US citizens and critical infrastructure Read More

    Read More

  • Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

    Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the…

    Read More

  • NIST Cybersecurity Framework 2.0

    NIST has released version 2.0 of the Cybersecurity Framework: The CSF 2.0, which supports implementation of the National Cybersecurity Strategy, has an expanded scope that goes beyond protecting critical infrastructure, such as hospitals and power plants, to all organizations in any sector. It also has a new focus on governance, which encompasses how organizations make…

    Read More

  • Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient

    Government agencies from the Five Eyes coalition said that Ivanti’s own tools are not sufficient to detect compromise Read More

    Read More

News, Advisories and much more

Exit mobile version