News

  • Friday Squid Blogging: Footage of Black-Eyed Squid Brooding Her Eggs

    Amazing footage of a black-eyed squid (Gonatus onyx) carrying thousands of eggs. They tend to hang out about 6,200 feet below sea level. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • Who is Alleged Medibank Hacker Aleksandr Ermakov?

    Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33-year-old Aleksandr Ermakov allegedly stole and leaked the Medibank data while working with one of Russia’s most destructive ransomware groups,…

    Read More

  • Ukraine Arrests Hacker for Assisting Russian Missile Strikes

    Ukraine’s security services said that the IT specialist from Kharkiv targeted government websites and provided intelligence to Russia to carry out missile strikes Read More

    Read More

  • Protect What Matters on Data Privacy Day

    Imagine a “Privacy Facts” label on the apps, devices, and websites you use. Like a digital version of the “Nutrition Facts” on the sides of your cereal boxes and other food you buy. With a quick look, you could see what the company behind that app, device, or website collects — and what they do…

    Read More

  • Protect What Matters on Data Privacy Day

    Imagine a “Privacy Facts” label on the apps, devices, and websites you use. Like a digital version of the “Nutrition Facts” on the sides of your cereal boxes and other food you buy. With a quick look, you could see what the company behind that app, device, or website collects — and what they do…

    Read More

  • New Leaks Expose Web of Iranian Intelligence and Cyber Companies

    Recorded Future analyzed leaks describing the close relationship between the Iranian government and Iran-aligned APT groups Read More

    Read More

  • Chatbots and Human Conversation

    For most of history, communicating with a computer has not been like communicating with a person. In their earliest years, computers required carefully constructed instructions, delivered through punch cards; then came a command-line interface, followed by menus and options and text boxes. If you wanted results, you needed to learn the computer’s language. This is…

    Read More

  • Cybersecurity for Industrial Control Systems: Best practices 

    The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Network segmentation, software patching, and continual threats monitoring are key cybersecurity best practices for Industrial Control Systems (ICS). Although ICSs significantly improve health…

    Read More

  • Data Privacy Week: Companies are Banning Generative AI Due to Privacy Risks

    Cisco found that privacy and data security risks have led to over a quarter of organizations banning generative AI, at least temporarily, while a majority have instituted controls Read More

    Read More

  • 3 CIS Resources to Help You Drive Your Cloud Cybersecurity

    Once you’ve migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help. Read More

    Read More

News, Advisories and much more

Exit mobile version