News

  • CISA Warns Against Malicious Use of Legitimate RMM Software

    PRIVACY PRIVACY The document mentions an October 2022 cyber campaign involving the malicious use of RMM solutions Read More

    Read More

  • ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if convicted

    PRIVACY PRIVACY A 22-year-old suspected of being “Seyzo”, a member of the ShinyHunters cybercrime gang, has been extradited from Morocco to the United States, where – if convicted – he could face up to 116 years in prison. The ShinyHunters gang became notorious in 2020, following a series of data breaches that impacted over 60…

    Read More

  • On Alec Baldwin’s Shooting

    PRIVACY PRIVACY We recently learned that Alec Baldwin is being charged with involuntary manslaughter for his accidental shooting on a movie set. I don’t know the details of the case, nor the intricacies of the law, but I have a question about movie props. Why was an actual gun used on the set? And why…

    Read More

  • NCSC: Iranian and Russian Groups Targeting Government, Activists and Journalists With Spearphishing

    PRIVACY PRIVACY The NCSC advisory details tactics used by Russia-based threat actor SEABORGIUM and Iran-based group TA453 Read More

    Read More

  • Predicting which hackers will become persistent threats

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the authors in this article. This blog was jointly written with David Maimon, Professor at Georgia State University. Website defacement Websites are central to business operations…

    Read More

  • Dark Web Posts Advertising Counterfeit Cash Surge 90%

    PRIVACY PRIVACY Physical currency remains a big draw for cyber-criminals Read More

    Read More

  • Near-Record Year for US Data Breaches in 2022

    PRIVACY PRIVACY Breach notices are increasingly opaque, warns non-profit Read More

    Read More

  • 9 API security tools on the frontlines of cybersecurity

    PRIVACY PRIVACY Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current form without APIs holding everything together or managing much of backend functionality. Because…

    Read More

  • Recent legal developments bode well for security researchers, but challenges remain

    PRIVACY PRIVACY Despite the hoodie-wearing bad guy image, most hackers are bona fide security researchers protecting users by probing and testing the security configurations of digital networks and assets. Yet the law has often failed to distinguish between malicious hackers and good-faith security researchers. This failure to distinguish between the two hacker camps has, however,…

    Read More

  • Lloyds Bank Warns of 80% Surge in Advance Fee Scams

    PRIVACY PRIVACY Fake ads for loans, jobs and properties are on the rise Read More

    Read More

News, Advisories and much more

Exit mobile version