January 14, 2021 | David Bisson

Security context: The starting point for how Kubernetes Pod security works

This blog was written by an independent guest blogger. Organizations are increasingly adopting Kubernetes to manage their containerized workloads and services, but Kubernetes security incidents are on the rise, as well. In the fall 2020 edition of the “State of Container and Kubernetes Security” report, for instance, 91% of respondents told StackRox that they had recently adopted Kubernetes. Three quarters…

January 13, 2021 | Tom Hegel

A Global Perspective of the SideWinder APT

AT&T Alien Labs has conducted an investigation on the adversary group publicly known as SideWinder in order to historically document its highly active campaigns and identify a more complete picture of targets, motivations, and objectives. Through our investigation, we have uncovered a collection of activity targeting government and business throughout South Asia and East Asia spanning many years.…

Get the latest security news in your inbox.

Subscribe via email

RSS

January 13, 2021 | Nick Cavalancia

What is a vulnerability management program and should your business have one?

This blog was written by a third party author. The rapid rate of change in attack methods and techniques in today’s cybersecurity landscape has made the keeping of an environment secure increasingly more difficult, causing many to fall into a dangerous state of simply reacting to current threats. Organizations that are serious about the state of their cybersecurity…

January 12, 2021 | Mayleen Menez

Why cybersecurity awareness is a team sport

Image Source This blog was written by an independent guest blogger. Cybersecurity may be different based on a person's viewpoint. One may want to simply protect and secure their social media accounts from hackers, and that would be the definition of what cybersecurity is to them. On the other hand, a small business owner may want to protect…

January 11, 2021 | Nahla Davies

Why are cybercriminals suddenly targeting maritime infrastructure?

This blog was written by an independent guest blogger. If you were asked to list out the top problems society has been facing in 2020, cyberattacks on the maritime industry might not be an obvious issue that would come to mind. But the industry has seen a worrying trend in recent months, as a spike in cyberattacks that has left some…

January 7, 2021 | Ofer Caspi

Malware using new Ezuri memory loader

This blog was written by Ofer Caspi and Fernando Martinez of AT&T Alien Labs Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk.…

January 7, 2021 | Ericka Chickowski

What is URL filtering? Web filtering explained

This blog was written by a third party author. What is URL filtering? URL filtering is one of the most common types of web filtering techniques used by organizations to restrict the kinds of content that their users may access.  URL filtering blocks users from loading questionable websites or hosted files via corporate device or network resources. The filter…

January 6, 2021 | Karoline Gore

IoT Cybersecurity Act successfully signed into law

This blog was written by an independent guest blogger. The IoT Cybersecurity Act, which aims to reduce the supply chain risk to the federal government arising from vulnerable IoT devices, was recently passed into law, and its effects are expected to carry over into private enterprise. Critics felt the law was long overdue: as found in the Nokia Threat Intelligence…

January 5, 2021 | Rupesh Chokshi

Calm in the COVID storm: AT&T Cybersecurity

We’ve been busy at AT&T Cybersecurity during the pandemic. Turns out we could help out our network customers in so many ways. Here are some examples: Helping enable remote learning Many schools closed their doors in Spring 2020, when COVID-19 cases began to spike within the U.S. and quickly transitioned to a distance learning model. While…

January 5, 2021 | Ericka Chickowski

What is a software-defined perimeter and how does SDP work?

This blog was written by a third party author. What is a software-defined perimeter? A software defined perimeter (SDP) establishes virtual boundaries around Internet-connected assets and user activity through an integrated security architecture approach. SDP works regardless of whether assets reside on-premises or in the cloud, or whether users are on-site or working remote. Rather than relying on hardware like…

December 22, 2020 | Bernard Brode

‘Tis the season for session hijacking - Here’s how to stop it

This blog was written by an independent guest blogger. The air is getting colder, leaves are falling from the trees, and people everywhere are settling in for the holiday season. Which means one thing - increased cybersecurity vulnerability. With more aspects of the winter holidays relegated to online platforms this year, people everywhere are more susceptible to cyberattacks. Luckily, there…

December 18, 2020 | J.R. Parsons

‘Twas the night before InfoSec

This blog was written by an independent guest blogger. ‘Twas the night before Christmas, and fresh off the LAN The packets were coming fast out of the span. My wireshark was up with my templates in place, In hopes that I’d find an IP I could trace. The smart home was snug in its /28 With a meager…