News

  • Smashing Security podcast #316: Of Musk and Afroman

    PRIVACY PRIVACY An Elon Musk-worshipping college principal gets schooled, and rapper Afroman turns the tables after armed police raid his house. All this and much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault. Read More

    Read More

  • How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis

    PRIVACY PRIVACY Microsoft’s Sarah Armstrong-Smith explains why past incidents are crucial to informing our incident response strategies Read More

    Read More

  • FBI (and Others) Shut Down Genesis Market

    PRIVACY PRIVACY Genesis Market is shut down: Active since 2018, Genesis Market’s slogan was, “Our store sells bots with logs, cookies, and their real fingerprints.” Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials. But earlier today, multiple domains associated…

    Read More

  • UK Discloses Offensive Cyber Capabilities Principles

    PRIVACY PRIVACY The National Cyber Force, a joint agency between GCHQ and the Ministry of Defence, revealed the principles ruling its cyber operations Read More

    Read More

  • FBI Leads International Effort to Seize Domains for Notorious Genesis Market

    PRIVACY PRIVACY Cybercrime marketplace facilitated trade in stolen credentials Read More

    Read More

  • Obsidian launches new SaaS security and compliance tools

    PRIVACY PRIVACY Cybersecurity firm Obsidian has launched its SaaS security posture management (SSPM) solution with new security and compliance tools to help organizations manage third-party SaaS integrations. The SaaS-based deployment will feature three primary modules including Obsidian Compliance Posture Management (CPM), Obsidian Integration Risk Management, and Obsidian Extend. “Obsidian not only provides posture hardening and…

    Read More

  • How Can You Identify and Prevent Insider Threats?

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  If cyber threats feel like faceless intruders, you’re only considering a fraction of the risk. Insider threats pose a challenge for…

    Read More

  • Database Snafu Leaks 600K Records from Marketplace

    PRIVACY PRIVACY Z2U users accused of selling online accounts and malware Read More

    Read More

  • Strategic risk analysis is key to ensure customer trust in product, customer-facing app security

    PRIVACY PRIVACY CISOs are no longer only responsible for the cybersecurity of systems used internally. In many organizations they also focus on securing products and public-facing applications, and one way to do this well is through risk assessment. Assessing risk requires identifying baseline security criteria around key elements such as customer contracts and regulatory requirements,…

    Read More

  • Let’s pump the brakes on the rush to incorporate AI into cybersecurity

    PRIVACY PRIVACY It seems that everyone is rushing to embed artificial intelligence into their solutions, and security offerings are among the latest to obtain this shiny new thing. Like many, I see the potential for AI to help bring about positive change, but also its potential as a threat vector. To some, recent AI developments…

    Read More

News, Advisories and much more

Exit mobile version