-
CISA Warns Against Malicious Use of Legitimate RMM Software
PRIVACY PRIVACY The document mentions an October 2022 cyber campaign involving the malicious use of RMM solutions Read More
-
ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if convicted
PRIVACY PRIVACY A 22-year-old suspected of being “Seyzo”, a member of the ShinyHunters cybercrime gang, has been extradited from Morocco to the United States, where – if convicted – he could face up to 116 years in prison. The ShinyHunters gang became notorious in 2020, following a series of data breaches that impacted over 60…
-
On Alec Baldwin’s Shooting
PRIVACY PRIVACY We recently learned that Alec Baldwin is being charged with involuntary manslaughter for his accidental shooting on a movie set. I don’t know the details of the case, nor the intricacies of the law, but I have a question about movie props. Why was an actual gun used on the set? And why…
-
NCSC: Iranian and Russian Groups Targeting Government, Activists and Journalists With Spearphishing
PRIVACY PRIVACY The NCSC advisory details tactics used by Russia-based threat actor SEABORGIUM and Iran-based group TA453 Read More
-
Predicting which hackers will become persistent threats
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the authors in this article. This blog was jointly written with David Maimon, Professor at Georgia State University. Website defacement Websites are central to business operations…
-
Dark Web Posts Advertising Counterfeit Cash Surge 90%
PRIVACY PRIVACY Physical currency remains a big draw for cyber-criminals Read More
-
Near-Record Year for US Data Breaches in 2022
PRIVACY PRIVACY Breach notices are increasingly opaque, warns non-profit Read More
-
9 API security tools on the frontlines of cybersecurity
PRIVACY PRIVACY Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current form without APIs holding everything together or managing much of backend functionality. Because…
-
Recent legal developments bode well for security researchers, but challenges remain
PRIVACY PRIVACY Despite the hoodie-wearing bad guy image, most hackers are bona fide security researchers protecting users by probing and testing the security configurations of digital networks and assets. Yet the law has often failed to distinguish between malicious hackers and good-faith security researchers. This failure to distinguish between the two hacker camps has, however,…
-
Lloyds Bank Warns of 80% Surge in Advance Fee Scams
PRIVACY PRIVACY Fake ads for loans, jobs and properties are on the rise Read More