-
Microsoft’s EU data boundary plan to take effect Jan. 1
PRIVACY PRIVACY The plan, which covers Microsoft products and services such as Azure, Power BI, Dynamics 365 and Office 365, will allow customers to store and process their customer data within the EU. Read More
-
Dark Data: What is it? How can you best utilize it?
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Data continues to be a valuable asset for an organization and plays a crucial role in making operational and strategic business…
-
Feds Hit DDoS-for-Hire Services with 48 Domain Seizures
PRIVACY PRIVACY Six also charged in connection with booter services Read More
-
Over 85% of Attacks Hide in Encrypted Channels
PRIVACY PRIVACY Zscaler reveals 20% increase in malicious use of encryption Read More
-
Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it
PRIVACY PRIVACY Last year, two high severity, easily exploitable Microsoft Exchange vulnerabilities dubbed ProxyLogon and ProxyShell made waves in the infosec sphere. Nearly a year later, Exchange Server admins are met with another threat: ProxyNotShell, which in fact is a vulnerability chain comprising two actively exploited flaws: CVE-2022-41040 is a server-side request forgery (SSRF) vulnerability…
-
Platforms Flooded with 144,000 Phishing Packages
PRIVACY PRIVACY NuGet, PyPi and npm inundated with malicious packages Read More
-
How to Browse Privately on Your Phone
PRIVACY PRIVACY Your phone is likely a daily companion, giving you access to work emails, chats with friends, weather reports, and more — all in the palm of your hand. You can also use your phone for browsing online, looking up everything from your favorite recipes to your most-read media webpages. While being able to…
-
Reimagining Democracy
PRIVACY PRIVACY Last week, I hosted a two-day workshop on reimagining democracy. The idea was to bring together people from a variety of disciplines who are all thinking about different aspects of democracy, less from a “what we need to do today” perspective and more from a blue-sky future perspective. My remit to the participants…
-
Cuba ransomware group used Microsoft developer accounts to sign malicious drivers
PRIVACY PRIVACY Microsoft suspended several accounts on its hardware developer program that signed malicious drivers used by a ransomware group called Cuba to disable endpoint security tools. The driver certificates have been revoked and the drivers will be added to a blocklist that Windows users can optionally deploy. “In most ransomware incidents, attackers kill the…
-
Six Charged in Mass Takedown of DDoS-for-Hire Sites
PRIVACY PRIVACY The U.S. Department of Justice (DOJ) today seized four-dozen domains that sold “booter” or “stresser” services — businesses that make it easy and cheap for even non-technical users to launch powerful Distributed Denial of Service (DDoS) attacks designed knock targets offline. The DOJ also charged six U.S. men with computer crimes related to…