Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AT&T Cybersecurity Insights Report: Securing the Edge - Available today

The data is in, the analysis is done, and the eleventh edition of the AT&T Cybersecurity Insights™ Report: Securing the Edge is ready for you! We know cybersecurity is a journey and not a destination, that is why each year we look forward to the publication of this report, a guide to help you on your journey to cybersecurity resiliency.

Top 5 Gaming Cybersecurity Trends for 2022 that you Need to Know

If we talk about industries that have skyrocketed immensely in recent times, mobile gaming would certainly top the list. However, as fun and profitable mobile games are for users and business owners, they involve unimaginable security risks. Mobile games involve volumes of sensitive user and business data and provide a very profitable setting for cybercriminals to take advantage of.

Random but Memorable - Episode 8.7: New Year Security Resolutions

Are you looking to declutter your digital life in 2022? Then we have some top tips for you! Tune in as we share how a digital declutter can improve your security in the New Year. 🧹 Plus we unveil some exciting 1Password news and expose all the latest security headlines in Watchtower Weekly (just as proficiently as the shutdown of ransomware gang: REvil.) And we're back with a bang for a James Bond themed round of Ridiculous Requirements! 💥

Cyber Insurance's Real Dilemma

Since the start of the pandemic, the cyber insurance industry has been facing its biggest challenge to date. A ransomware crime spree is demonstrating the speed and scale of cyber risk and how this type of risk is unlike any other insurable risk. The number of ransomware attacks increased by 150%. Total ransoms paid are up 311%. The dramatic rise in frequency and severity resulted in a record high loss ratio of 67% for insurance carriers.

Stranger Danger: Live hack of how a Log4Shell exploit works

The Log4Shell vulnerability took the Java community by surprise at the end of 2021, and many organizations are still mitigating its impact. To help development teams stay informed as the situation unfolds, Snyk has created and continues to update its Log4j vulnerability resource center.

Simplify Your Journey to SOC Modernization

The discipline of threat intelligence began to be incorporated in cyber defense processes within private sector companies nearly a decade ago. Over the past few years, more and more organizations began to establish their own threat intelligence operations, building Security Operations Centers (SOCs), incident response (IR) capabilities and threat intelligence teams.

How About a Magic Trick? A New Jester In Court

Over the past months, Cyberint Research Team observed a new group that emerged on several underground forums. What seemed to be “yet another info stealer seller” has turned out to be something far more interesting. As the group is named Jester Stealer, that were, at first, selling a fairly sophisticated info stealer (Figure 1). Other evidence suggests that there is much more to it. Cyberint Research Team discovered a developing threat group that gets their claws into whatever they can find.

A Cybersecurity Risk Checklist for Law Firms

The growing wave of cybercrime targets businesses in every industry, and law firms are no exception. With many unique cybersecurity risks, law firms are more onerous to secure than other organizations. In addition to having to fend off threats from cybercriminals, they must also overcome the threat posed by hacktivists and nation-states. Law firms are especially attractive to bad actors because attorneys need access to highly sensitive data to provide legal services.