News

  • Stories from the SOC – Lateral movement using default accounts

    PRIVACY PRIVACY Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If…

    Read More

  • Stories from the SOC – Lateral movement using default accounts

    PRIVACY PRIVACY Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If…

    Read More

  • Ronin Crypto Heist of $618m Traced to North Korea

    PRIVACY PRIVACY Lazarus Group blamed by US Treasury Read More

    Read More

  • Managing container vulnerability risks: Tools and best practices

    PRIVACY PRIVACY Containers are quickly becoming the de facto form of compute and workload deployments in the cloud-native ecosystem. The latest Cloud Native Computing Foundation (CNCF) Cloud Native Survey shows that 96% of organizations are either actively using containers and Kubernetes or are evaluating them. Containers have well-known benefits such as portability, consistency and efficiency,…

    Read More

  • Managing container vulnerability risks: Tools and best practices

    PRIVACY PRIVACY Containers are quickly becoming the de facto form of compute and workload deployments in the cloud-native ecosystem. The latest Cloud Native Computing Foundation (CNCF) Cloud Native Survey shows that 96% of organizations are either actively using containers and Kubernetes or are evaluating them. Containers have well-known benefits such as portability, consistency and efficiency,…

    Read More

  • Cybersecurity litigation risks: 4 top concerns for CISOs

    PRIVACY PRIVACY The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs. According to Norton Rose Fulbright’s latest Annual Litigation Trends Survey of more than 250 general counsel and in-house litigation…

    Read More

  • Cybersecurity litigation risks: 4 top concerns for CISOs

    PRIVACY PRIVACY The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs. According to Norton Rose Fulbright’s latest Annual Litigation Trends Survey of more than 250 general counsel and in-house litigation…

    Read More

  • Attacker Accessed Dozens of Repositories After OAuth Token Theft

    PRIVACY PRIVACY GitHub says npm is among the organizations affected Read More

    Read More

  • Pegasus Spyware Targeted UK Prime Minister, Say Researchers

    PRIVACY PRIVACY UAE linked to covert cyber-espionage plot Read More

    Read More

  • Conti’s Ransomware Toll on the Healthcare Industry

    PRIVACY PRIVACY Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other…

    Read More

News, Advisories and much more

Exit mobile version