Cyber Security

Web Shells Gain Sophistication for Stealth, Persistence

Web shells, a common type of post-exploitation tool that provides easy-to-use interface through which to issue commands to a compromised server, have become...

How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe

Video During the attack, the group deployed several tools, most notably a...

Establishing and Keeping the Trust: The Cisco Duo Managed Services Story

You’re about to close your day when you receive a call from your customer asking for an urgent meeting tomorrow. They want to...

Thanksgiving Cyber feast: Safeguarding against seasonal scams

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

Microsoft launches Defender Bounty Program with $20,000 rewards

Microsoft has unveiled a new bug bounty program aimed at the Microsoft Defender security platform, with rewards between $500 and $20,000. While higher awards...

North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns

Nov 22, 2023NewsroomCyber Espionage / Social Engineering North Korean threat actors have been linked to two campaigns in which they masquerade as both job...

Exploit for Critical Windows Defender Bypass Goes Public

A proof-of-concept exploit (PoC) has become available for a critical zero-day vulnerability in the Windows SmartScreen technology.Microsoft issued a patch for the issue...

Playing your part in building a safer digital world: Why cybersecurity matters

We Live Progress, Digital Security In an increasingly complex and interconnected digital...

Latest articles