Cyber Security

Return to Sender: Why DMARC is no longer a “nice to have”

The continued prevalence of email vulnerabilities has increased the need for an advanced enterprise DMARC solution that makes it easier for Cisco customers...

Gift cards or data theft? Ensuring safe online shopping this festive season

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

Large-Scale Scam Campaigns Made Possible by Generative AI – Sophos News

Generative artificial intelligence technologies such as OpenAI’s ChatGPT and DALL-E have created a great deal of disruption across much of our digital lives....

U.S., U.K., and Global Partners Release Secure AI System Development Guidelines

Nov 27, 2023NewsroomArtificial Intelligence / Privacy The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the...

Balancing Simplicity and Security in the Digital Experience

Digitalization has spawned a golden age of consumer sovereignty. Consumers have tremendous power because they're better informed and have more choices. E-commerce has...

Hunting Mammoths using Telegram bot

More and more people nowadays prefer to buy goods online. And why not? It’s convenient, goods will be delivered...

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive...

Malware Uses Trigonometry to Track Mouse Strokes

The latest version of the LummaC2 malware-as-a-service includes a new anti-sandbox maneuver — version 4.0 knows trigonometry and can use it to track...

Latest articles