News

  • CommonMagic Malware Implants Linked to New CloudWizard Framework

    PRIVACY PRIVACY Kaspersky researchers said sections of the CloudWizard code were identical to CommonMagic Read More

    Read More

  • Experts Warn of Voice Cloning-as-a-Service

    PRIVACY PRIVACY Dark web offerings could commoditize deep fake technology Read More

    Read More

  • Take action now to avoid BianLian ransomware attacks, US Government warns organisations

    PRIVACY PRIVACY A joint alert has been issued by US government agencies, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks. Read More

    Read More

  • CIS Controls Community Volunteer Spotlight: David Tchozewski

    PRIVACY PRIVACY David Tchozewski has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. Read More

    Read More

  • Security Risks of New .zip and .mov Domains

    PRIVACY PRIVACY Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability. Read More

    Read More

  • #CRESTCon: White House Shifts US Cybersecurity Strategy Towards International Cooperation

    PRIVACY PRIVACY Andy Williams, CEO of Global Transatlantic Ltd, spoke at CRESTCon Europe about the new US National Cybersecurity Strategy Read More

    Read More

  • Accessibility should be a cybersecurity priority, says UK NCSC

    PRIVACY PRIVACY The UK National Cyber Security Centre (NCSC) has urged businesses and security leaders to make accessibility a cybersecurity priority to help make systems more secure and human errors/workarounds less likely. It can also aid in meeting legal requirements, delivering better operational outcomes, and attracting and retaining more diverse talent, according to the NCSC.…

    Read More

  • Phishing-resistant MFA 101: What you need to know

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. While…

    Read More

  • NCSC: It’s Time for CISOs to Prioritize Accessibility

    PRIVACY PRIVACY Doing so will make human errors and workarounds less likely Read More

    Read More

  • Teen Charged in DraftKings Credential Stuffing Case

    PRIVACY PRIVACY Wisconsin man alleged to have stolen $600,000 from accounts Read More

    Read More

News, Advisories and much more

Exit mobile version