-
CommonMagic Malware Implants Linked to New CloudWizard Framework
PRIVACY PRIVACY Kaspersky researchers said sections of the CloudWizard code were identical to CommonMagic Read More
-
Experts Warn of Voice Cloning-as-a-Service
PRIVACY PRIVACY Dark web offerings could commoditize deep fake technology Read More
-
Take action now to avoid BianLian ransomware attacks, US Government warns organisations
PRIVACY PRIVACY A joint alert has been issued by US government agencies, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks. Read More
-
CIS Controls Community Volunteer Spotlight: David Tchozewski
PRIVACY PRIVACY David Tchozewski has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. Read More
-
Security Risks of New .zip and .mov Domains
PRIVACY PRIVACY Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability. Read More
-
#CRESTCon: White House Shifts US Cybersecurity Strategy Towards International Cooperation
PRIVACY PRIVACY Andy Williams, CEO of Global Transatlantic Ltd, spoke at CRESTCon Europe about the new US National Cybersecurity Strategy Read More
-
Accessibility should be a cybersecurity priority, says UK NCSC
PRIVACY PRIVACY The UK National Cyber Security Centre (NCSC) has urged businesses and security leaders to make accessibility a cybersecurity priority to help make systems more secure and human errors/workarounds less likely. It can also aid in meeting legal requirements, delivering better operational outcomes, and attracting and retaining more diverse talent, according to the NCSC.…
-
Phishing-resistant MFA 101: What you need to know
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. While…
-
NCSC: It’s Time for CISOs to Prioritize Accessibility
PRIVACY PRIVACY Doing so will make human errors and workarounds less likely Read More
-
Teen Charged in DraftKings Credential Stuffing Case
PRIVACY PRIVACY Wisconsin man alleged to have stolen $600,000 from accounts Read More