QR code phishing also known as ‘Quishing’ is a cyberattack that leverages Quick Response (QR) codes to deceive individuals into revealing sensitive information or taking malicious actions. QR codes are two-dimensional barcodes that can store various types of data, including…
Tag: Cybersecurity Insiders
Trending Ransomware News headlines on Google
Investigation Deepens into MGM Resorts Hack and Caesars Entertainment Ransomware Attack Recent developments in the ongoing investigation into the MGM Resorts hack and the Caesars Entertainment ransomware attack have shed new light on the culprits behind these cybercrimes. Law enforcement…
FBI and CISA issue Cyber Alert against Snatch Ransomware
When it comes to the world of cybersecurity, the FBI and CISA have a reputation for issuing timely alerts, especially when the threat severity is high. Their latest warning revolves around the notorious Snatch ransomware-as-a-service gang. In their advisory, the…
Cisco acquires Splunk for $28 billion
Cisco, a prominent player in the networking industry, has recently completed a significant acquisition by purchasing cybersecurity solutions provider Splunk for a substantial sum of $28 billion. This announcement was made public through the company’s PR division, shedding light on…
Data Security in traditional Data Centre vs Cloud Environments
In today’s data-driven world, the importance of data security cannot be overstated. Businesses and organizations are constantly faced with the challenge of safeguarding their sensitive information against evolving cyber threats. Two primary approaches for data storage and management are traditional…
WEBINAR: PCI DSS 4.0 Compliance – Tips and Best Practices to Avoid Last-Minute Panic
Join the webinar ‘PCI DSS 4.0 Compliance – Tips and Best Practices to Avoid Last-Minute Panic‘ live on September 26. While the deadline for compliance with the Payment Card Industry Data Security Standard (PCI DSS) 4.0 requirements isn’t until March…
Bringing Authentication Security Out of the Dark Ages
Cyber threats have grown increasingly sophisticated in recent years, with an expanding attack surface, today’s hybrid work environment and new vulnerabilities introduced by the IoT are a few of the challenges. Despite this evolving landscape, most organizations have yet to…
Beyond the firewall: Navigating SaaS security challenges
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Introduction: In today’s digital age, businesses have witnessed…
Cyber Attack on International Criminal Court for arresting Russia Vladimir Putin
In March of this year, the International Criminal Court (ICC) based in The Hague made headlines by issuing an arrest warrant against Russian President Vladimir Putin. The allegations against Putin revolve around accusations of committing atrocities against innocent Ukrainian citizens…
T Mobile app customers experience data security concerns
Users of the T-Mobile App have recently encountered an unsettling phenomenon, with their account information displaying the personal data of other users. This concerning breach includes sensitive information such as credit card details, billing history, physical addresses, credit balances, and…