January 26, 2021 | Kim Crawley

JavaScript cybersecurity threats

This blog was written by an independent guest blogger. JavaScript is a very useful programming language. Netscape developers invented JavaScript in 1995, and it revolutionized the web. Before JavaScript, webpages could pretty much only contain text, images, and hyperlinks. JavaScript empowered web developers to make webpages interactive, dynamic rather than static. Think of picture menus that animated when your mouse cursor…

January 25, 2021 | Devin Partida

How reliable is real-time security?

This blog was written by an independent guest blogger. Today’s world is a fast-paced one, and that reality means changing the approach to security. Traditional ways of securing networks or premises often involved responding to threats after they happened or preparing for the most likely attacks based on experience. Now, an option called real-time security — or real-time…

Get the latest security news in your inbox.

Subscribe via email

RSS

January 21, 2021 | Jason Lawrence

Education, certifications, and cybersecurity

The question of cybersecurity certifications comes up very frequently on discussion boards.  What is the best certificate to get?  Is a college degree better for getting a cybersecurity role?  What education or skills are needed for various cybersecurity roles?  And many, many more.  In this post, I'll try to clarify some of these questions…

January 19, 2021 | Rakesh Shah

We are better together: AT&T USM Anywhere and Digital Defense Frontline

An enterprise needs an evolving view of its environment.  What does normal look like?  What are the weak spots?  What is the impact of the threat to your environment?  Detecting the threat after collecting the right data is the first step.  From there, the impact of the threat really matters; otherwise, security teams may be…

January 18, 2021 | Nahla Davies

5 New cybersecurity threats and challenges facing the financial services sector

This blog was written by an independent guest blogger. It’s been a mixed year for the financial services sector. Some companies have seen increased demand for their services, while others have struggled to deal with the downturn in mortgage deals and reduced consumer spending.  At a more granular level, many financial services companies have also had to…

January 14, 2021 | David Bisson

Security context: The starting point for how Kubernetes Pod security works

This blog was written by an independent guest blogger. Organizations are increasingly adopting Kubernetes to manage their containerized workloads and services, but Kubernetes security incidents are on the rise, as well. In the fall 2020 edition of the “State of Container and Kubernetes Security” report, for instance, 91% of respondents told StackRox that they had recently adopted Kubernetes. Three quarters…

January 13, 2021 | Tom Hegel

A Global Perspective of the SideWinder APT

AT&T Alien Labs has conducted an investigation on the adversary group publicly known as SideWinder in order to historically document its highly active campaigns and identify a more complete picture of targets, motivations, and objectives. Through our investigation, we have uncovered a collection of activity targeting government and business throughout South Asia and East Asia spanning many years.…

January 13, 2021 | Nick Cavalancia

What is a vulnerability management program and should your business have one?

This blog was written by a third party author. The rapid rate of change in attack methods and techniques in today’s cybersecurity landscape has made the keeping of an environment secure increasingly more difficult, causing many to fall into a dangerous state of simply reacting to current threats. Organizations that are serious about the state of their cybersecurity…

January 12, 2021 | Mayleen Menez

Why cybersecurity awareness is a team sport

Image Source This blog was written by an independent guest blogger. Cybersecurity may be different based on a person's viewpoint. One may want to simply protect and secure their social media accounts from hackers, and that would be the definition of what cybersecurity is to them. On the other hand, a small business owner may want to protect…

January 11, 2021 | Nahla Davies

Why are cybercriminals suddenly targeting maritime infrastructure?

This blog was written by an independent guest blogger. If you were asked to list out the top problems society has been facing in 2020, cyberattacks on the maritime industry might not be an obvious issue that would come to mind. But the industry has seen a worrying trend in recent months, as a spike in cyberattacks that has left some…

January 7, 2021 | Ofer Caspi

Malware using new Ezuri memory loader

This blog was written by Ofer Caspi and Fernando Martinez of AT&T Alien Labs Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk.…

January 7, 2021 | Ericka Chickowski

What is URL filtering? Web filtering explained

This blog was written by a third party author. What is URL filtering? URL filtering is one of the most common types of web filtering techniques used by organizations to restrict the kinds of content that their users may access.  URL filtering blocks users from loading questionable websites or hosted files via corporate device or network resources. The filter…