News

  • LockBit 3.0 Ransomware Variants Surge Post Builder Leak

    PRIVACY PRIVACY Kaspersky explained that LockBit 3.0, also known as LockBit Black, first emerged in June 2022 Read More

    Read More

  • New Ransomware Campaign Targets Citrix NetScaler Flaw

    PRIVACY PRIVACY Sophos X-Ops suspects the involvement of a well-known ransomware threat actor known as STAC4663 Read More

    Read More

  • Report Reveals Growing Disparity in Cyber Insurance Landscape

    PRIVACY PRIVACY Delinea’s report shows gap grows as firms struggle for cyber insurance, longer policy wait times Read More

    Read More

  • On Public Wi-Fi, a VPN is Your Friend

    PRIVACY PRIVACY You can almost feel it in the air. Wi-Fi is everywhere. And if you tap into public Wi-Fi, do it with a VPN.  The keyword in public Wi-Fi is “public.” That means anyone else on the network can see what you’re connecting to and what data you’re passing along, with a little effort.…

    Read More

  • Identity Theft from 1965 Uncovered through Face Recognition

    PRIVACY PRIVACY Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used the stolen identity to obtain Social Security benefits under both identities, multiple passports and state identification cards, law enforcement officials said. […] A new investigation was launched…

    Read More

  • Battling malware in the industrial supply chain

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Here’s how organizations can eliminate content-based malware in ICS/OT supply chains. As the Industrial Internet of Things (IIoT) landscape expands, ICS…

    Read More

  • Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platforms

    PRIVACY PRIVACY Existing phishing-as-a-service platforms are increasingly incorporating adversary-in-the-middle capabilities Read More

    Read More

  • Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

    PRIVACY PRIVACY ReliaQuest found that 80% of cyber intrusion campaigns used either QakBot, SocGholish or Raspberry Robin Read More

    Read More

  • Remotely Stopping Polish Trains

    PRIVACY PRIVACY Turns out that it’s easy to broadcast radio commands that force Polish trains to stop: …the saboteurs appear to have sent simple so-called “radio-stop” commands via radio frequency to the trains they targeted. Because the trains use a radio system that lacks encryption or authentication for those commands, Olejnik says, anyone with as…

    Read More

  • Biden’s IoT Cybersecurity initiative

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The Biden Administration has recently announced the implementation of a cybersecurity labeling program for smart devices. Overseen by the Federal Communication…

    Read More

News, Advisories and much more

Exit mobile version