-
Stories from the SOC – Lateral movement using default accounts
PRIVACY PRIVACY Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If…
-
Stories from the SOC – Lateral movement using default accounts
PRIVACY PRIVACY Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If…
-
Ronin Crypto Heist of $618m Traced to North Korea
PRIVACY PRIVACY Lazarus Group blamed by US Treasury Read More
-
Managing container vulnerability risks: Tools and best practices
PRIVACY PRIVACY Containers are quickly becoming the de facto form of compute and workload deployments in the cloud-native ecosystem. The latest Cloud Native Computing Foundation (CNCF) Cloud Native Survey shows that 96% of organizations are either actively using containers and Kubernetes or are evaluating them. Containers have well-known benefits such as portability, consistency and efficiency,…
-
Managing container vulnerability risks: Tools and best practices
PRIVACY PRIVACY Containers are quickly becoming the de facto form of compute and workload deployments in the cloud-native ecosystem. The latest Cloud Native Computing Foundation (CNCF) Cloud Native Survey shows that 96% of organizations are either actively using containers and Kubernetes or are evaluating them. Containers have well-known benefits such as portability, consistency and efficiency,…
-
Cybersecurity litigation risks: 4 top concerns for CISOs
PRIVACY PRIVACY The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs. According to Norton Rose Fulbright’s latest Annual Litigation Trends Survey of more than 250 general counsel and in-house litigation…
-
Cybersecurity litigation risks: 4 top concerns for CISOs
PRIVACY PRIVACY The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs. According to Norton Rose Fulbright’s latest Annual Litigation Trends Survey of more than 250 general counsel and in-house litigation…
-
Attacker Accessed Dozens of Repositories After OAuth Token Theft
PRIVACY PRIVACY GitHub says npm is among the organizations affected Read More
-
Pegasus Spyware Targeted UK Prime Minister, Say Researchers
PRIVACY PRIVACY UAE linked to covert cyber-espionage plot Read More
-
Conti’s Ransomware Toll on the Healthcare Industry
PRIVACY PRIVACY Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other…