![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Consequence of working from home: exposure to smart speakers - ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_tile.jpg)
Consequence of working from home: exposure to smart speakers - ThreatTraq
This is a transcript of a recent ThreatTraq video. In it, Don Heatley is interviewing John Markley, Principal Technology Security and Tony Tortorici, Associate Director Technology, Security Platforms, of the AT&T Chief Secrity Office on the topic of smart speakers in a home office setting. While smart speakers wouldn't be appropriate in a corporate office,…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Different threat actors exploiting the coronavirus crisis to send spear phishing campaigns | ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_tile.jpg)
Different threat actors exploiting the coronavirus crisis to send spear phishing campaigns | ThreatTraq
Don’t let coronavirus fears make you vulnerable to phishing scams. Ganesh Kasina and Andy Benavides of the AT&T Chief Security Office along with Jaime Blasco of AT&T Alien Labs discuss the week's top cybersecurity news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![TrickBot has a trick up its sleeve using UAC | ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_tile.jpg)
TrickBot has a trick up its sleeve using UAC | ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Manny Ortiz, Director Technology Security, AT&…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Real attacks and fake factories, Honeypots expose risks to smart manufacturing systems. | ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking-news-768x427.jpg)
Real attacks and fake factories, Honeypots expose risks to smart manufacturing systems. | ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Mike Klepper, Principal Architect, AT&T…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Safely downloading applications and more | ThreatTraq Essentials](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_tile.jpg)
Safely downloading applications and more | ThreatTraq Essentials
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Don Heatley, Principal Technology Security, AT&…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![MITRE ATT&CK for Cloud | AT&T ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_OG.jpg)
MITRE ATT&CK for Cloud | AT&T ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Jaime Blasco, VP and Chief Scientist, AT&…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Smart spy apps on home devices | AT&T ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_OG.jpg)
Smart spy apps on home devices | AT&T ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Tony Tortorici, Associate Director – Technology…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Zombie code hiding everywhere! ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_tile.jpg)
Zombie code hiding everywhere! ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features John Markley, Principal Technology Security,…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![WSD protocol used for amplifying DDoS | ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking_news_tile.jpg)
WSD protocol used for amplifying DDoS | ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Jim Clausing, Principal Member of Technical…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Great Cannon DDOS attacks](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking-news-768x427.jpg)
Great Cannon DDOS attacks
It looks like the attackers upgraded the code during the attack to check for Cloudflare and target more URLs: pic.twitter.com/2wqP9gj7pR — chris doman (@chrisdoman) September 2, 2019 Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them;…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![GootKit malware bypasses Windows Defender | AT&T ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/breaking-news-768x427.jpg)
GootKit malware bypasses Windows Defender | AT&T ThreatTraq
Photo by Christopher Beddies on Unsplash Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent…
![](https://cdn-cybersecurity.att.com/images/uploads/blog-listing-img-hover.png)
![Can you trust threat intelligence from threat sharing communities? | AT&T ThreatTraq](https://cdn-cybersecurity.att.com/blog-content/Blog-Images/tile/threat-intelligence-open-graph.jpg)
Can you trust threat intelligence from threat sharing communities? | AT&T ThreatTraq
Every week the AT&T Chief Security Office produces a series called ThreatTraq with helpful information and news commentary for InfoSec practitioners and researchers. I really enjoy them; you can subscribe to the Youtube channel to stay updated. This is a transcript of a recent feature on ThreatTraq. The video features Jaime Blasco, VP and…