News

  • Stories from the SOC – Inactive Account Exploitation

    Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary One of the primary ways that adversaries gain access to environments is through valid credentials. Because of this, maintenance and auditing…

    Read More

  • Stories from the SOC – Inactive Account Exploitation

    Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive summary One of the primary ways that adversaries gain access to environments is through valid credentials. Because of this, maintenance and auditing…

    Read More

  • 22 cybersecurity myths organizations need to stop believing in 2022

    The past few years have seen a dramatic shift in how organizations protect themselves against attackers. The hybrid working model, fast-paced digitalization, and increased number of ransomware incidents have changed the security landscape, making CISOs’ jobs more complex than ever. This convoluted environment requires a new mindset to defend, and things that might have held…

    Read More

  • 22 cybersecurity myths organizations need to stop believing in 2022

    The past few years have seen a dramatic shift in how organizations protect themselves against attackers. The hybrid working model, fast-paced digitalization, and increased number of ransomware incidents have changed the security landscape, making CISOs’ jobs more complex than ever. This convoluted environment requires a new mindset to defend, and things that might have held…

    Read More

  • Red vs. blue vs. purple teams: How to run an effective exercise

    In the arsenal of cybersecurity defenses is the exercise that goes by the name of red team/blue team simulated attack. These simulations are designed to closely mimic real-world conditions. For example, one red team member might take on the role of an employee clicking on a phishing link that deposits malware on the network. The…

    Read More

  • Red vs. blue vs. purple teams: How to run an effective exercise

    In the arsenal of cybersecurity defenses is the exercise that goes by the name of red team/blue team simulated attack. These simulations are designed to closely mimic real-world conditions. For example, one red team member might take on the role of an employee clicking on a phishing link that deposits malware on the network. The…

    Read More

  • Friday Squid Blogging: Piglet Squid

    Nice article on the piglet squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • MoonBounce UEFI implant used by spy group brings firmware security into spotlight

    Researchers uncovered a stealthy UEFI rootkit that’s being used in highly targeted campaigns by a notorious Chinese cyberespionage group with suspected government ties. The group is known for using software supply-chain attacks in the past. Dubbed MoonBounce by researchers from Kaspersky Lab, the implant’s goal is to inject a malicious driver into the Windows kernel…

    Read More

  • Attackers use public cloud providers to spread RATs

    A campaign that uses public cloud service providers to spread malware has been discovered by Cisco Talos. The offensive is the latest example of threat actors abusing cloud services like Microsoft Azure and Amazon Web Services for malicious purposes, security researchers Chetan Raghuprasad and Vanja Svajcer wrote in the Talos blog. To camouflage their activity,…

    Read More

  • Homelife of Connecticut Residents Secretly Recorded

    Homelife of Connecticut Residents Secretly Recorded A man from Connecticut has been arrested on suspicion of using digital devices to record his neighbors.  Waterford resident Keith Hancock allegedly recorded 10 victims from outside their homes, two of whom were juveniles. Six of the individuals were filmed while undressing.  Hancock is also suspected of recording more victims while…

    Read More