Cyber Security

What’s the Best Way to Communicate After a Data Breach?

Question: How can organizations effectively communicate with users and external stakeholders in a security incident?Ashley Sawatsky, Senior Incident Response Advocate, Rootly: No matter...

In-depth analysis, recovery strategies, and best practices

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

Google fixes 8th Chrome zero-day exploited in attacks this year

Google has released emergency updates to fix another Chrome zero-day vulnerability exploited in the wild, the eighth patched since the start of the...

Hackers Exploiting Old MS Excel Vulnerability to Spread Agent Tesla Malware

Dec 21, 2023NewsroomVulnerability / Phishing Attack Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to distribute a strain of...

ISAs and the Dawning Hardware Security Revolution

The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication....

These aren’t the Android phones you should be looking for

When shopping for a new smartphone, you’re likely to look for the best bang for your buck. If you’re...

Cyber Security Trends to Watch in Australia in 2024

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber...

Latest articles