In a concerning cybersecurity development, it appears that hackers with potential ties to Beijing managed to breach the cryptographic key of Microsoft Accounts. This unauthorized access allowed them to conduct surveillance on various U.S. government agencies. Reports indicate that this…
Category: Cybersecurity Insiders
Ransomware spreading gang reveals visa details of working employees in America
In an unprecedented turn of events in the United States, a relatively obscure ransomware group has committed a grave act by exposing the personal information of individuals who held work visas in the country. This audacious breach took place earlier…
Battling malware in the industrial supply chain
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Here’s how organizations can eliminate content-based malware in…
Leveraging AT&T Cybersecurity Consulting for a robust Zero Trust Center of Excellence
As cybersecurity becomes increasingly complex, having a centralized team of experts driving continuous innovation and improvement in their Zero Trust journey is invaluable. A Zero Trust Center of Excellence (CoE) can serve as the hub of expertise, driving the organization’s…
Keeping cybersecurity regulations top of mind for generative AI use
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Can businesses stay compliant with security regulations while…
Biden’s IoT Cybersecurity initiative
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The Biden Administration has recently announced the implementation…
Considerations to be made when dealing with Ransomware Payments
When a server falls victim to a ransomware infection, the urgency to regain access to critical data often leads to a difficult decision: paying the hackers’ demands. However, the reliability of ransomware criminals in conducting their “business” is far from…
Cyber Threats Emerging from Text Message Spam and Smishing
In today’s digital age, where smartphones have become an integral part of our lives, cyber threats are constantly evolving. While email spam and phishing attacks are widely recognized, a newer threat has been gaining prominence: text message spam, often referred…
Top 5 Cybersecurity Concerns with 5G
Amid the growing interest from both companies and governments in transitioning to the cutting-edge fifth generation of wireless networks, commonly known as 5G, security experts are sounding the alarm about the challenges that come with securing this dynamic and complex…
Securing the smart cities of tomorrow: Cybersecurity challenges and solutions
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Smart cities are on the rise. What was…