July 13, 2020 | Nahla Davies

Teaching kids skills to catch hackers and fix security risks at Cyber Discover

We are now living in an era where kids are growing up with the internet every day. Those of us who are older learned how to be more skeptical of technology, but our children largely aren’t growing up with this same level of skepticism. Today, over 60% of children are using the internet for over forty hours a week.…

July 9, 2020 | Edwardo Rodriguez

Stories from the SOC - Credential Dumping

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary During the Investigation of a Suspicious Security Critical Event alarm, we discovered credentials had been dumped from the NTDS.dit, which is…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

July 8, 2020 | Mike Cotton

Ransomware attacks on the perimeter

This blog was written by a guest blogger. As companies shift more focus to combatting the recent epidemic in ransomware attacks, they are faced with choices on how to best deploy defenses to counter new attacker tactics and stay ahead of the threat.  While much of these efforts focus on system backup and recovery processes, anything that can be…

July 8, 2020 | Mark Stone

Zero Trust security model explained: what is Zero Trust?

This blog was written by a third party author What is Zero Trust? Zero Trust is a cybersecurity model with a tenet that any endpoint connecting to a network should not be trusted by default. With Zero Trust, everything and everyone— including users, devices, endpoints —must be properly verified before access to the network is allowed. The protocols…

July 8, 2020 | Nick Cavalancia

Vulnerability assessment steps, process explained

This blog was written by a third party author What is a vulnerability assessment? Vulnerability assessment is the process of defining, identifying, classifying, and prioritizing vulnerabilities in systems, applications, and networks. It provides an organization with the needed visibility into the risks that exist concerning external threats designed to take advantage of vulnerabilities. At a tactical level, the vulnerability assessment…

July 8, 2020 | Ericka Chickowski

Types of DDoS attacks explained

This blog was written by a third party author and does not reflect the opinions of AT&T The general types of DDoS attacks Distributed denial of service (DDoS) is a broad class of cyberattack that disrupts online services and resources by overwhelming them with traffic. This renders the targeted online service unusable for the duration of the DDoS…

July 7, 2020 | Nahla Davies

Building security culture: How organizations can improve cybersecurity

This blog was written by an independent guest blogger. As our personal and business lives move into the digital sphere, implementing robust cybersecurity practices has quickly become a necessity. Much like brushing your teeth twice a day or making sure you get eight hours of sleep each night, it’s important to regularly protect and clean our data. Indeed,…

July 6, 2020 | Zachary Curley

Improving workflows to speed security implementation

Introduction Limited budgets, limited staff, limited time. Any security professional will have dealt with all of these repeatedly while trying to launch new initiatives or when completing day-to-day tasks. They are possibly the most severe and dangerous adversaries that many cybersecurity professionals will face. They affect every organization regardless of industry, size, or location and pose an existential threat to…

July 2, 2020 | Nick Cavalancia

Vulnerability management explained

This blog was written by a third party author. What is vulnerability management? Every year, thousands of new vulnerabilities are discovered, requiring organizations to patch operating systems (OS) and applications and reconfigure security settings throughout the entirety of their network environment. To proactively address vulnerabilities before they are utilized for a cyberattack, organizations serious about the security of their environment…

July 2, 2020 | Mayleen Menez

3 Steps to better cybersecurity in touchless business solutions (Part 2 of 3)

This blog was written by an independent guest blogger. Image Source In Part 1 of this series, we covered the first step to better cybersecurity in touchless business solutions, which is to practice extra caution in cashless payment solutions. We continue by discussing the second step to improve cybersecurity for touchless systems, which is to increase protocols for cybersecurity and data…

July 1, 2020 | Tawnya Lancaster

New report: COVID-19 Threat Intelligence Insight from the Telco Security Alliance

AT&T Cybersecurity along with three members of the Telco Security Alliance (TSA) published a new report today, “COVID-19 Insight from the Telco Security Alliance.” The report provides insight into some of the threat groups (as well as analysis of their campaigns) that are taking advantage of the global pandemic while nations and organizations are vulnerable. TSA…

June 30, 2020 | Ericka Chickowski

Cybersecurity penetration testing explained

This blog was written by a third party author. What is penetration testing? Cybersecurity penetration testing is a method of checking for security weaknesses in software and systems by simulating real-world cyber-attacks. Also known colloquially as 'pen tests,' penetration tests probe beyond the scope of automated vulnerability scans. Pen tests find gaps in protection that can arise when unique combinations…