News

  • Microsoft’s EU data boundary plan to take effect Jan. 1

    PRIVACY PRIVACY The plan, which covers Microsoft products and services such as Azure, Power BI, Dynamics 365 and Office 365, will allow customers to store and process their customer data within the EU. Read More

    Read More

  • Dark Data: What is it? How can you best utilize it?

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Data continues to be a valuable asset for an organization and plays a crucial role in making operational and strategic business…

    Read More

  • Feds Hit DDoS-for-Hire Services with 48 Domain Seizures

    PRIVACY PRIVACY Six also charged in connection with booter services Read More

    Read More

  • Over 85% of Attacks Hide in Encrypted Channels

    PRIVACY PRIVACY Zscaler reveals 20% increase in malicious use of encryption Read More

    Read More

  • Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it

    PRIVACY PRIVACY Last year, two high severity, easily exploitable Microsoft Exchange vulnerabilities dubbed ProxyLogon and ProxyShell made waves in the infosec sphere. Nearly a year later, Exchange Server admins are met with another threat: ProxyNotShell, which in fact is a vulnerability chain comprising two actively exploited flaws: CVE-2022-41040 is a server-side request forgery (SSRF) vulnerability…

    Read More

  • Platforms Flooded with 144,000 Phishing Packages

    PRIVACY PRIVACY NuGet, PyPi and npm inundated with malicious packages Read More

    Read More

  • How to Browse Privately on Your Phone

    PRIVACY PRIVACY Your phone is likely a daily companion, giving you access to work emails, chats with friends, weather reports, and more — all in the palm of your hand. You can also use your phone for browsing online, looking up everything from your favorite recipes to your most-read media webpages.  While being able to…

    Read More

  • Reimagining Democracy

    PRIVACY PRIVACY Last week, I hosted a two-day workshop on reimagining democracy. The idea was to bring together people from a variety of disciplines who are all thinking about different aspects of democracy, less from a “what we need to do today” perspective and more from a blue-sky future perspective. My remit to the participants…

    Read More

  • Cuba ransomware group used Microsoft developer accounts to sign malicious drivers

    PRIVACY PRIVACY Microsoft suspended several accounts on its hardware developer program that signed malicious drivers used by a ransomware group called Cuba to disable endpoint security tools. The driver certificates have been revoked and the drivers will be added to a blocklist that Windows users can optionally deploy. “In most ransomware incidents, attackers kill the…

    Read More

  • Six Charged in Mass Takedown of DDoS-for-Hire Sites

    PRIVACY PRIVACY The U.S. Department of Justice (DOJ) today seized four-dozen domains that sold “booter” or “stresser” services — businesses that make it easy and cheap for even non-technical users to launch powerful Distributed Denial of Service (DDoS) attacks designed knock targets offline. The DOJ also charged six U.S. men with computer crimes related to…

    Read More

News, Advisories and much more

Exit mobile version