Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ransomware Statistics, Facts, and Trends of 2023

Ransomware is one of the most dangerous cyber attacks to businesses and consumers. This type of malware holds files and data hostage until a ransom is paid. Ransomware incidents can result in data loss, financial losses, and even ransomware payments. In order to protect your business from ransomware-based data breaches, it is important to understand ransomware statistics, ransomware trends, and the best practices for ransomware prevention.

Dark Data: What is it? How can you best utilize it?

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Data continues to be a valuable asset for an organization and plays a crucial role in making operational and strategic business decisions. With the growth of hybrid, private, and multi-cloud models, much of the data is stored on these platforms and becomes vulnerable to malicious activities and potential data leaks.

How Financial Institutions can use PAN verification APIs for Remote Client Onboarding

Banks still struggle to properly integrate clients even though the majority of financial institutions (FIs) have explicit digital-first initiatives to automate & optimise their backend operations. The majority of corporate clients need an easy-to-use onboarding process with little human involvement and foolproof verification, but due to strict compliance requirements and a high demand for customization, this is a challenging challenge.

Compliance is a great starting point for security; it's not the final destination

Compliance is a fundamental baseline for many organizations but doesn’t guarantee security. While there is some overlap, today’s security leaders must recognize the need to go beyond what compliance frameworks call for to achieve an extra layer of protection and peace of mind against potentially devastating breaches. Compliance may set the foundation, but it should never be viewed as providing total protection or proof of a robust security posture.

Unveiling CrowdStrike Falcon Surface: The Industry's Most Complete Adversary-Driven External Attack Surface Management (EASM) Technology

Resilient cybersecurity posture can only be achieved with a full understanding of your internal and external attack surface. CrowdStrike Falcon® Surface builds on our award-winning adversary intelligence with cutting-edge external attack surface management (EASM) capabilities for a complete picture of known and unknown externally exposed assets, all delivered via the unified CrowdStrike Falcon® platform.

Trustwave Action Response: Zero-Day Vulnerability in Citrix ADC (CVE-2022-27518)

On Tuesday, December 13, a joint announcement from the United States NSA and Citrix announced a zero-day vulnerability in Citrix ADC. The vulnerability (CVE-2022-27518) is a critical unauthenticated Remote Code Execution (RCE) issue currently rated as CVSS 9.8. Patches are already available from Citrix. The NSA attributes the zero-day to APT5, a Chinese hacking collective. There is currently no guidance for how widespread the campaign has been or how long it's been ongoing.

Meta-Phish: Facebook Infrastructure Used in Phishing Attack Chain

Meta has two of the largest social media platforms today, Facebook and Instagram. These platforms became the modern gateway for people not just to socialize and eavesdrop on the lives of famous personalities, but more importantly, to stay connected with their friends and loved ones. The sites also became effective channels for organizations to advertise and disseminate information.