Start your SASE readiness consultation today. Learn more ⟶
  • Support
  • Contact
AT&T Business
AT&T Business
AT&T Cybersecurity
Contact us
  • Products
    • Cybersecurity Consulting Services
      • Cyber Strategy
      • Strategy and Roadmap Planning
      • Enterprise Security Assessment Services
      • Risk-based Cyber Posture Assessment
      • Risk and Compliance
      • Security Compliance
      • Vulnerability and Threat Management
      • Managed Vulnerability Program
      • Penetration Testing
      • Adversary Simulation Services
      • Incident Response Services
      • CSO Advisory Services
      • Cybersecurity IQ Training
      • Strategy and Roadmap Planning
      • Enterprise Security Assessment Services
      • Risk-based Cyber Posture Assessment
      • Security Compliance
      • Managed Vulnerability Program
      • Penetration Testing
      • Adversary Simulation Services
      • Incident Response Services
      • Cybersecurity IQ Training
    • Managed Security Services
      • Network Security
      • Secure Web Gateway
      • Secure Remote Access
      • SASE Branch with Fortinet
      • SASE with Palo Alto Networks
      • Reactive Distributed Denial of Service Defense
      • View All
      • Threat Detection
      • Managed Threat Detection and Response
      • Endpoint Security
      • SentinelOne
      • Ivanti (MobileIron)
      • Lookout Mobile Endpoint Security
      • Secure Web Gateway
      • Secure Remote Access
      • SASE Branch with Fortinet
      • SASE with Palo Alto Networks
      • Reactive Distributed Denial of Service Defense
      • Managed Threat Detection and Response
      • SentinelOne
      • Ivanti (MobileIron)
      • Lookout Mobile Endpoint Security
    • Network Security
      • AT&T Trusted Internet Access
      • Secure Web Gateway
      • Secure Remote Access
      • Secure Workforce with Check Point
      • Network Based Firewalls
      • Premises Based Firewalls
      • Premises-Based Firewall Express with Check Point
      • Enhanced Cybersecurity Services
      • AT&T Infrastructure and Application Protection
      • Reactive Distributed Denial of Service Defense
      • ACDN Prolexic DDoS
      • AT&T Trusted Internet Access
      • Secure Web Gateway
      • Secure Remote Access
      • Secure Workforce with Check Point
      • Network Based Firewalls
      • Premises Based Firewalls
      • Premises-Based Firewall Express with Check Point
      • Enhanced Cybersecurity Services
      • AT&T Infrastructure and Application Protection
      • Reactive Distributed Denial of Service Defense
      • ACDN Prolexic DDoS
    • Endpoint Security
      • Endpoint Security
      • SentinelOne
      • Ivanti (MobileIron)
      • VMware Workspace ONE®
      • IBM MaaS360
      • Lookout Mobile Endpoint Security
      • McAfee Endpoint Protection
      • Samsung Knox
      • SentinelOne
      • Ivanti (MobileIron)
      • VMware Workspace ONE®
      • IBM MaaS360
      • Lookout Mobile Endpoint Security
      • McAfee Endpoint Protection
      • Samsung Knox
    • Threat Detection and Response
      • AT&T Threat Solutions
      • Managed Threat Detection and Response
      • Threat Detection and Response for Government
      • USM Anywhere
      • USM Anywhere Advisors
      • XDR for MSSPs
      AT&T Alien Labs logo

      Powered by
      AT&T Alien Labs

      • AT&T Threat Solutions
      • Managed Threat Detection and Response
      • Threat Detection and Response for Government
      • USM Anywhere
      • USM Anywhere Advisors
      • XDR for MSSPs
    • Web Application and API Protection
       
       
    • Modernizing Network Security
       
       
  • Solutions
    • See All Solutions
    Compliance
    • Overview
    • GDPR
    • HIPAA
    • ISO 27001
    • PCI DSS
    • SOC 2
    Industry
    • Education
    • Energy Sector
    • Federal
    • Financial Services
    • Healthcare
    • Manufacturing
    • MSSPs
    • Retail
    Environment
    • 5G
    • AWS
    • Azure
    • Cloud
    • IOT/Mobility
    • Hybrid
    • Network
    • Remote Workforce
    Security Use Cases
    • Intrusion Detection
    • Secure Access Service Edge
    • Secure Web Gateway
    • SIEM Platform Solutions
    • XDR
    • Zero Trust Architecture
    View All Solutions ⟶
  • Partners
    • Become a Partner
    Become a Partner
    • All Partner Programs
    • MSSP Program
    • Reseller Program
    • Partner Portal Login
    Find a Partner
    • Find an MSSP
    • Find a Reseller
    • Professional Services
    Technology Partners
    • USM Anywhere Integrations
    • OTX Partners
    Become a Partner ⟶
  • Resources
    The Hub

    Explore The Hub, our home for all virtual experiences

    Explore now ⟶
    • View All Resources
    Product Resources
    • Customer Stories
    • Product Briefs
    • Product Demos
    • Product Reviews
    • Solution Briefs
    • Use Cases
    • Free Trial
    Security Resources
    • Analyst Reports
    • Blogs
    • eBooks
    • Videos
    • Webcasts
    • White Papers
    • Industry Reports
    Customer Resources
    • Success Center
    • Certification
    • Customer Success
    • Documentation
    • Professional Services
    • Support Overview
    • Training
    Browse by Topic
    • Incident Response
    • Intrusion Detection
    • Partner: MSSP & Reseller
    • Regulatory Compliance
    • Security Operations Center
    • SIEM & Log Management
    • Threat Detection
    • Threat Intelligence
    View All Resources ⟶
  • AT&T Alien Labs
  • Contact
  • Support
Get price
  1. AT&T Cybersecurity services
  2. Blog
  3. AT&T Security Essentials Blog

Security essentials

  • Categories:
  • All blogs
  • Security essentials
  • AT&T Alien Labs research
Categories
  • All blogs
  • Security essentials
  • AT&T Alien Labs research
10 Ways B2B companies can improve mobile security
Security Essentials
10 Ways B2B companies can improve mobile security
Mar 15, 2023   |   Anas Baig
Read
Broken Object Level Authorization: API security’s worst enemy
Security Essentials
Broken Object Level Authorization: API security’s worst enemy
Mar 14, 2023   |   Thomas Jung
Read
Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks
Security Essentials
Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks
Mar 13, 2023   |   Alex Vakulov
Read

2023 AT&T Cybersecurity Insights Report

Edge Ecosystem

Get the cybersecurity report ⟶

2023 AT&T Cybersecurity Insights Report
Guiding publications for US strategy on Quantum Information Science (QIS)
Security Essentials
Guiding publications for US strategy on Quantum Information Science (QIS)
Mar 8, 2023   |   Ernest Lane
Read
An assessment of ransomware distribution on darknet markets
Security Essentials
An assessment of ransomware distribution on darknet markets
Mar 7, 2023   |   Dr. C. Jordan Howell & Lauren Tremblay
Read
What is firewall optimization?
Security Essentials
What is firewall optimization?
Mar 6, 2023   |   Keith Thomas
Read
8 Common Cybersecurity issues when purchasing real estate online: and how to handle them
Security Essentials
8 Common Cybersecurity issues when purchasing real estate online: and how to handle them
Mar 2, 2023   |   Anas Baig
Read
Third party Cybersecurity risks in securing the supply chain
Security Essentials
Third party Cybersecurity risks in securing the supply chain
Mar 1, 2023   |   Co-authored by AT&T and Palo Alto Networks
Read
AT&T Cybersecurity announces 2023 ‘Partner of the Year Award’ winners
Security Essentials
AT&T Cybersecurity announces 2023 ‘Partner of the Year Award’ winners
Feb 28, 2023   |   Barry Skidmore
Read
‹‹ ‹ 3 4 5 6 7 › ››
AT&T Business
From the Blog
Fernando Martinez

Fernando Martinez

May 30, 2023

SeroXen RAT for sale

Explore All Blog Posts ›
Twitter LinkedIn Facebook Youtube Instagram
Who We Are
  • Alien Labs
  • Customers
  • Careers
  • Contact Us
News
  • Newsroom
  • Events
  • Blogs
Partners
  • Partner Programs
  • Partner Portal
Products
  • AT&T Managed Threat Detection and Response
  • USM Anywhere
  • XDR for MSSPs
  • Open Threat Exchange (OTX)
  • OSSIM
Solutions
  • Cloud Security Monitoring
  • Threat Detection
  • Intrusion Detection
  • SIEM platform solutions
  • Vulnerability Assessment
  • See All Solutions
Resources
  • Resources
  • Blogs
  • Customer Reference Guide
Customer Success
  • Support & Services
  • Success Center
  • Documentation Center
  • Training
  • Certification
Contact us

© Copyright 2023

  • Privacy Policy
  • Website Terms of Use
  • GDPR
  • Cookie Policy
  • Your Privacy ChoicesCalifornia Consumer Privacy Act (CCPA) Opt-Out Icon

We use cookies to provide you with a great user experience. By using our website, you agree to our Privacy Policy and Website Terms of Use.