Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rubrik Security Cloud - Government Is On the FedRAMP Marketplace

Here at Rubrik, we are rapidly progressing towards our initial FedRAMP® moderate authorization, and we are very excited to be listed as “In Process” on the FedRAMP Marketplace. This is an important milestone in delivering Rubrik’s data security platform to the U.S. federal government organizations.

How Do Hackers Steal Passwords?

Hackers steal your passwords through a variety of methods including data breaches, password cracking, guessing, physical theft and malware. This can have serious consequences, especially if the hackers gain access to your accounts, but there are ways to protect yourself. Read on to learn more about how hackers steal passwords and how to prevent them from gaining access to your accounts.

CVE-2023-27997: Critical Fortinet Fortigate SSL-VPN RCE Vulnerability

On June 9th 2023, security researchers from Olympe CyberDefense published a blog stating that they responsibly disclosed a critical vulnerability in SSL-VPN firewalls to Fortinet. This vulnerability, CVE-2023-27997, is a critical, pre-authentication RCE vulnerability that impacts all versions of Fortinet SSL-VPN firewalls, even if multi-factor authentication (MFA) is enabled. The security researchers responsibly disclosed the vulnerability to Fortinet.

Top Six Identity Security Risks Compounding Cyber Debt and Expanding the Attack Surface

The prolonged period of low-capital costs and widely available funding may be over, yet digital adoption persists as business leaders seek to unlock efficiencies and innovation everywhere. This is driving exponential but often unsecure identity growth in the enterprise and putting existing levels of cyber debt at risk of compounding as investment in digital and cloud initiatives continues to outpace cybersecurity spend.

The Pearland School District Suffers a Data Breach Impacting More than 55,000 People

The Pearland Independent School District spans over 23 separate campuses in the Pearland, Texas area. The district teaches over 21,000 students and employs as many as 1,771 individuals. The large district generates approximately $144 million in revenue annually and handles data for tens of thousands of students, parents, and employees.

Top 5 Ways Cybercriminals Engage in Credential Harvesting: Protecting Your Login Credentials

In today's digital world, login credentials are the keys to the kingdom. Whether it's your online banking, your social media accounts, or your work accounts, your login credentials are essential for accessing your personal information. Unfortunately, cybercriminals are always looking for ways to obtain these credentials, and their techniques are becoming increasingly sophisticated.

Rise of AI in Cybercrime: How ChatGPT is revolutionizing ransomware attacks and what your business can do

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. OpenAI's flagship product, ChatGPT, has dominated the news cycle since its unveiling in November 2022. In only a few months, ChatGPT became the fastest-growing consumer app in internet history, reaching 100 million users as 2023 began.

Microsoft Describes a Sophisticated Phishing Campaign that Targeted Several Financial Organizations

Microsoft describes a sophisticated phishing campaign that targeted several financial organizations. “Microsoft Defender Experts uncovered a multi-stage adversary-in-the-middle (AiTM) phishing and business email compromise (BEC) attack against banking and financial services organizations,” the researchers write. “The attack originated from a compromised trusted vendor and transitioned into a series of AiTM attacks and follow-on BEC activity spanning multiple organizations.

State-Based Cyber Attacks Continue to Be a Thorn in the Cyber Insurer's Side

As government-sponsored and widespread vulnerability attacks continue to result in larger damages, cyber insurers are looking for opportunities to still meet demand without incurring risk. It may come as a surprise, but cyber insurers aren’t in the business of issuing (and covering) cyber insurance policies; they’re in the business of staying in business. And that means identifying and reducing the highest sources of risk where the insurer will lose through paying on claims.