June 10, 2020 | Nahla Davies

Are airports and airlines prepared for cyber threats post COVID-19?

This blog was written by an independent guest blogger. The COVID-19 pandemic has unveiled numerous vulnerabilities and shortcomings in the airline industry. What’s worse for aviation in particular over other industries is how airports have essentially served as the portal for the virus traveling from one country to another across the globe. As a result of severe travel…

June 9, 2020 | Carisa Brockman

Fireside chat: cybersecurity thought leadership

In these trying times, the issues in cybersecurity are changing. Some emerging key themes we are seeing as consultants are: A suddenly remote workforce An acceleration in digital and cloud transformation A surge in cybercrime related to COVID-19 How does having a robust security framework with well-defined policies enable companies to react quickly when a major disruption occurs?  It…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

June 8, 2020 | Jeff LaCroix

Stories from the SOC - detecting network anomalies with OTX

This blog was co-written by Leo Garcia, Sr. Specialist - Cybersecurity.. Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary This Investigation was initiated on the basis of several Network Anomaly…

June 4, 2020 | Jason Nelson

 Keeping kids safe online

This blog was written by an independent guest blogger. As we all know by now, the Internet is an excellent tool for business, learning, and entertainment. Not only is it a tool, but it's also an essential part of our lives. Information, connections, and opportunities at the touch or swipe of a finger. As more and more people…

June 3, 2020 | Andrew Lukosevic

Stories from the SOC- SSH Brute Force Authentication Attempt

Ervin McBride IV – TDP Engineer II contributed to this article. Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary The Managed Threat Detection and Response (MTDR) analyst team received and…

June 2, 2020 | Tawnya Lancaster

Threat hunting explained: what is cyber threat hunting?

What is threat hunting? The process of threat hunting involves proactively searching for malware or attackers that are hiding within a network. Rather than simply relying on security solutions or services to detect threats, threat hunting is a predictive element to a layered security strategy, empowering organizations to go on the offensive looking for threats. Threat hunting is typically carried…

June 1, 2020 | Karoline Gore

Top Cybersecurity threats For seniors

This blog was written by an independent guest blogger. There are around 39.5 million people in the U.S. aged over 65, and a high percentage of them, particularly women (nearly 40%) live alone. Living alone makes seniors more reliant on technology, which can be a savior (think Zoom, Skype and other communication-centered technology) as well as a threat (from…

May 31, 2020 | Kim Crawley

Explain how a Virtual Private Network (VPN) works

This blog was written by an independent guest blogger. Global health events in 2020 have accelerated a trend. Office workers are working from home more frequently. This is great for many reasons. Companies can save money on office space. People are often more productive in the environment they’re most comfortable in, their homes. Rush hour can be mitigated with…

Consequence of working from home: exposure to smart speakers - ThreatTraq

This is a transcript of a recent ThreatTraq video. In it, Don Heatley is interviewing John Markley, Principal Technology Security and Tony Tortorici, Associate Director Technology, Security Platforms, of the AT&T Chief Secrity Office on the topic of smart speakers in a home office setting. While smart speakers wouldn't be appropriate in a corporate office,…

May 27, 2020 | Katelyn Ilkani

How malware mimics the spread of COVID-19

It’s a weird time to be alive. Millions of people globally are living under government lockdowns, as we collectively endure the COVID-19 pandemic. COVID-19 has brought to light some fundamental truths about humanity, including our deep-seated need for social interactions. It has also highlighted how reliant we are on critical infrastructure like our healthcare systems and internet connections,…

May 26, 2020 | Josh Gomez

Stories from the SOC - System compromise with lateral movement

Executive Summary Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Malicious network traffic from foreign IPs was observed trying to establish communication to a compromised internal system. The internal system was then…

May 19, 2020 | Dax Morrow

TrickBot BazarLoader In-Depth

Ofer Caspi, a fellow Alien Labs researcher, co-authored this blog. Executive Summary AT&T Alien Labs actively tracks the TrickBot group through an automated malware analysis system, hunting, and in-depth technical research. On April 20th, 2020 independent security researchers “pancak3lullz” (@pancak3lullz) and Vitali Kremez (@VK_Intel) posted a Tweet regarding two new TrickBot modules aptly named …