-
CIS Controls Community Volunteer Spotlight: Ken Muir
PRIVACY PRIVACY Ken Muir has done a lot to support effective security controls for cyber defense as a volunteer of the CIS Controls Community. Hear his story. Read More
-
Is this the answer to Google Drive spam?
PRIVACY PRIVACY There’s good news if you’re plagued by shared Google Drive files from strangers. Google Drive is getting a spam folder. Read More
-
Google is going to delete your data forever, if you haven’t logged into your account for two years
PRIVACY PRIVACY Google has announced a new policy on dealing with inactive accounts – and it’s an important read for anyone who doesn’t regularly login. Read more in my article on the Hot for Security blog. Read More
-
Acronis Launches EDR Solution with Potential for AI Integration
PRIVACY PRIVACY Acronis EDR is integrated into its Cyber Protect Cloud solution along with backup and data recovery functionalities Read More
-
Entro exits stealth with context-based secrets management
PRIVACY PRIVACY Entro, the Israeli cybersecurity company focused on protection for secrets and programmatic access to cloud services and data, has exited stealth with its first-ever product offering context-based secrets management. The new offering is the first and only holistic secrets security platform that detects, safeguards, and provides context for secrets stored across vaults, source code,…
-
Microsoft Secure Boot Bug
PRIVACY PRIVACY Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure Boot protections, allowing for the execution of malicious code before your PC begins loading Windows and its many security protections. Secure Boot has been enabled by default for over a decade on most…
-
Attacker uses the Azure Serial Console to gain access to Microsoft VM
PRIVACY PRIVACY Financially motivated threat actor UNC3944 is using phishing and SIM swapping attacks to take over Microsoft Azure admin accounts and gain access to virtual machines (VM), according to cybersecurity firm Mandiant. Using access to virtual machines the attackers employed malicious use of the Serial Console on Azure Virtual Machines to install third-party remote…
-
Insider threats surge across US CNI as attackers exploit human factors
PRIVACY PRIVACY Over three-quarters (77%) of organizations across US critical national infrastructure (CNI) have seen a rise in insider-driven cyberthreats in the last three years, according to new research from cybersecurity services firm Bridewell. The Cyber Security in CNI: 2023 report surveyed 525 cybersecurity decision makers in the US in the transport and aviation, utilities,…
-
Navigating the complex world of Cybersecurity compliance
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cyberattacks have become increasingly common, with organizations of all types and sizes being targeted. The consequences of a successful cyberattack can…
-
Cyber-Resilience Programs Failing on Poor Visibility
PRIVACY PRIVACY Organizations need a better way to build and assess programs Read More