Tag: Cybersecurity Insiders

Dangers of Deep Sea Phishing

By Michael Angelo Zummo, Threat Intel Expert – CybersixgillPhishing tools and services are common and accessible on the underground. We took a close look at one of them and discovered how easy it can be to launch a phishing scheme.…

Industry Experts React to DARPA’s AI Cyber Challenge

At Black Hat USA 2023, the Department of Defense (DoD) Defense Advanced Research Projects Agency (DARPA) unveiled a two-year “AI Cyber Challenge” (AIxCC) competition aimed at driving innovation in AI and the creation of new cybersecurity tools. The competition will…

Cyber Attack on MGM Hotel Group

MGM Resorts has officially announced an ongoing investigation into a cybersecurity incident that has severely impacted various aspects of its operations, including company emails, reservation records, room access systems, and even casino slot machines. Law enforcement agencies have been contacted…

Tenable to acquire Ermetic for $265 million

Tenable Inc., the cybersecurity company headquartered in Maryland, has officially revealed its plans to acquire the Israel-based Cloud Security Startup, Ermetic. Although the exact financial terms of the deal have not been disclosed, reliable sources have indicated that the acquisition…

Top blockchain Cybersecurity threats to watch out for

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Approximately 57 cryptocurrency thefts occurred in just the first…

Ransomware targets over 5000 government email addresses

The Sri Lankan Government has recently reported a significant data loss incident involving over 5000 email accounts spanning from May to August 2023. The primary cause of this data loss was identified as a cyber attack, specifically a ransomware variant.…

Killware vs. Ransomware: Key Differences

In the realm of cybersecurity threats, the terms “Killware” and “Ransomware” often surface in discussions. While both are malicious software designed to disrupt computer systems, they serve distinct purposes and operate in different ways. This article delves into the concepts…

Biometrics in law enforcement

How biometrics can help to make our world a safer place We’ve recently been exploring biometric technologies on this blog and how they have become a part of our everyday lives, helping us to move, travel and pay more seamlessly.…