In the ever-evolving landscape of cybersecurity, staying updated with the latest threats, vulnerabilities, and research findings is crucial. One of the most effective ways to gather information on cybersecurity is by using search engines. However, not all search engines are…
Tag: Cybersecurity Insiders
Apple says better keep data out of cloud
Apple’s recent Wonderlust event has garnered significant attention, particularly in the realm of digital viewership statistics. However, one noteworthy message from the tech giant has reverberated across the globe: safeguard your data by keeping it out of the cloud. Apple,…
Cyber Attack news headlines trending on Google
1. Cyber Attack Steals $400,000 from Diocese of Virginia Trust Fund In a startling revelation, a cyber attack in late 2022 has resulted in the theft of a trust fund worth $400,000 associated with the Diocese of Virginia. The incident…
How Zero-Day Attacks Are Escalating the Cyber Threat Landscape
In the ever-evolving landscape of cybersecurity, the term “zero-day attack” strikes fear into the hearts of both individuals and organizations alike. These attacks are notorious for their stealthy nature and the havoc they can wreak. As technology advances, so do…
The cat and mouse game: Staying ahead of evolving cybersecurity threats
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cybersecurity threats refer to malicious activities conducted over…
7 Steps to Implement Secure Design Patterns – A Robust Foundation for Software Security
By Dotan Nahum, Head of Developer-First Security at Check Point Software Technologies In an era where data breaches and cybersecurity attacks are rampant, secure software design has become not only a matter of technical proficiency, but a crucial component of…
Getting ready for a post-quantum world
Quantum computers are changing the cryptography rules Under Data Encryption, the CISA Zero Trust Maturity Model v2.0 cites the criticality of “cryptographic agility” on the third (out of four) level of maturity. Cryptographic agility is the ability to change the…
Two Ransomware Attack Stories currently trending on Google
In a recent development, Greater Manchester Police (GMP) officers have fallen victim to a highly sophisticated cyberattack. This attack targeted a technology provider and resulted in the unauthorized exposure of information including ranks, photographs, the precise geolocation where the photos…
MGM Hotel Resorts Cyber attack by Scattered Spider or BlackCat Ransomware
On Monday, September 11th, 2023, MGM Resorts and Hotels, a colossal entity valued at over $14 billion, found itself in the crosshairs of a meticulously orchestrated cyber assault, effectively crippling the casino operator’s operations. According to an online source, this…
Keeping cybersecurity regulations top of mind for generative AI use
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Can businesses stay compliant with security regulations while…