January 17, 2020 | Dean Chester

Journey to security: Data safety for travelers

Image source: Pixabay Note:This blog was written by an independent guest blogger. In today’s world, we enjoy incredible mobility that our ancestors could only dream of. In a matter of hours or, at most, days, we can go from one continent to another. At the same time, our lives depend on the security of all sorts of…

January 15, 2020 | Fernando Martinez

Alien Labs 2019 Analysis of Threat Groups Molerats and APT-C-37

In 2019, several industry analyst reports confused the threat groups Molerats and APT-C-37 due to their similarity, and this has led to some confusion and inaccuracy of attribution. For example, both groups target the Middle East and North Africa region (with a special emphasis on Palestine territories). And, they both approach victims through the use of phishing emails that contain decoy…

Get the latest security news in your inbox.

Subscribe via Email

January 14, 2020 | Sara Gepp

Running an Eco-friendly IT business

  (banner image green leaf key Adobe Stock ) As someone in the technology field I follow the steady stream of new and exciting products and gadgets that come out at least twice a year. I am constantly upgrading my tech and my IT work tools in keeping with what is new. I need to have personal experience with the devices…

January 13, 2020 | Jason Nelson

How to identify phishing emails and what to do

Note:This blog was written by an independent guest blogger. Phishing scams remain one of the most widespread cybercrimes. A phishing scam can be as simple as getting someone to click on a link, attachment, or a picture of cute kittens. I recently received a spam email with the message: “Old friends post embarrassing pictures of Jason Nelson online;…

January 10, 2020 | Kate Brew

Top 10 AT&T Cybersecurity blogs of 2019

Happy New Year! What a year 2019 was in cybersecurity. It was a great year for informative and interesting blogs. Here were the top performing AT&T Cybersecurity blogs written in 2019:  1. The Great Cannon has been deployed again by Chris Doman took the top spot! 2. AT&T Cybersecurity is Born by our CEO, Barmak Meftah…

January 9, 2020 | Fernando Dominguez

AT&T Alien Labs analysis of an active cryptomining worm

This blog post provides an overview of the AT&T Alien Labs™ technical analysis of the common malicious implants used by threat actors targeting vulnerable Exim, Confluence, and WebLogic servers. Upon exploitation, malicious implants are deployed on the compromised machine. While most of the attacks described below are historical, we at Alien Labs are continuing to see new…

January 8, 2020 | Karoline Gore

Security and digital payments – growth finally meeting demand

Note:This blog was written by an independent guest blogger. Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found that 67% of respondents cited a lack of visible security options as a reason for not adopting a…

January 7, 2020 | Devin Morrissey

Healthcare cybersecurity for 2020 and beyond

An independent guest blogger wrote this blog. block These days, effective cybersecurity in healthcare is as critical as ever. Last year, more than 32 million patients had their personal and medical information stolen in data breaches across the United States. While moves are being made, the fact remains that healthcare providers still have many holes to plug when it comes to…

January 6, 2020 | Bob Covello

Don’t give away your secret answers

Note:This blog was written by an independent guest blogger. I was watching an interview with an American Congressional member the other night, and I could not help but notice the person’s lack of cybersecurity awareness. As a disclaimer, please note that this is not a piece promoting or denouncing any political party, or view. I do not…

December 17, 2019 | Chuck Brooks

Top Cybersecurity trends & predictions for 2020

It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a quick list of what me may expect in the 2020. Cybersecurity will become even more of a strategic priority for companies as…

December 15, 2019 | Sam Bocetta

Should cities pay a ransomware demand?

UPDATE: In a “ripped from the headlines” moment, we have real world confirmation of the growing risk discussed in this article. Breaking news over the weekend revealed that both the city of New Orleans and New Jersey's largest hospital network are in the midst of dealing with serious ransomware attacks. When you hear about data breaches…

December 12, 2019 | Joe Gray

Which security certification is for you (if any)

It is hard to look at an information security job posting without seeing some certifications desired. Some make sense and others not so much. I have looked at junior helpdesk positions asking for CISSP, and some of the roles at some of the most respected companies do not ask for any certifications. There are some certifications that in having them…

Watch a Demo ›
Get Price Free Trial