News

  • CIS Controls Community Volunteer Spotlight: Ken Muir

    PRIVACY PRIVACY Ken Muir has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. Read More

    Read More

  • Is this the answer to Google Drive spam?

    PRIVACY PRIVACY There’s good news if you’re plagued by shared Google Drive files from strangers. Google Drive is getting a spam folder. Read More

    Read More

  • Google is going to delete your data forever, if you haven’t logged into your account for two years

    PRIVACY PRIVACY Google has announced a new policy on dealing with inactive accounts – and it’s an important read for anyone who doesn’t regularly login. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Acronis Launches EDR Solution with Potential for AI Integration

    PRIVACY PRIVACY Acronis EDR is integrated into its Cyber Protect Cloud solution along with backup and data recovery functionalities Read More

    Read More

  • Entro exits stealth with context-based secrets management

    PRIVACY PRIVACY Entro, the Israeli cybersecurity company focused on protection for secrets and programmatic access to cloud services and data, has exited stealth with its first-ever product offering context-based secrets management. The new offering is the first and only holistic secrets security platform that detects, safeguards, and provides context for secrets stored across vaults, source code,…

    Read More

  • Microsoft Secure Boot Bug

    PRIVACY PRIVACY Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure Boot protections, allowing for the execution of malicious code before your PC begins loading Windows and its many security protections. Secure Boot has been enabled by default for over a decade on most…

    Read More

  • Attacker uses the Azure Serial Console to gain access to Microsoft VM

    PRIVACY PRIVACY Financially motivated threat actor UNC3944 is using phishing and SIM swapping attacks to take over Microsoft Azure admin accounts and gain access to virtual machines (VM), according to cybersecurity firm Mandiant. Using access to virtual machines the attackers employed malicious use of the Serial Console on Azure Virtual Machines to install third-party remote…

    Read More

  • Insider threats surge across US CNI as attackers exploit human factors

    PRIVACY PRIVACY Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyberthreats in the last three years, according to new research from cybersecurity services firm Bridewell. The Cyber Security in CNI: 2023 report surveyed 525 cybersecurity decision makers in the US in the transport and aviation, utilities,…

    Read More

  • Navigating the complex world of Cybersecurity compliance

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Cyberattacks have become increasingly common, with organizations of all types and sizes being targeted. The consequences of a successful cyberattack can…

    Read More

  • Cyber-Resilience Programs Failing on Poor Visibility

    PRIVACY PRIVACY Organizations need a better way to build and assess programs Read More

    Read More

News, Advisories and much more

Exit mobile version