Cyber Security

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security...

Protecting Children’s Data Needs to Be a Priority for All

COMMENTARYOrganizations are facing a challenging cybersecurity environment and a chaotic threat landscape. With an increasingly broad range of sophisticated, easy-to-use tools in the...

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

The Australian government announced in 2023 that it would phase out the use...

Tesla hacked again, 24 more zero-days exploited at Pwn2Own Tokyo

Security researchers hacked the Tesla infotainment system and demoed 24 more zero-days on the second day of the Pwn2Own Automotive 2024 hacking competition. Synacktiv...

SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks

Jan 25, 2024NewsroomRemote Access Trojan Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. "SystemBC can be...

Help Wanted From Convicted Cybercriminals

The most recent ISC2 Cybersecurity Workforce Study found a shortfall of 111,000 professionals in the Middle East and Africa region. While that number...

How to Prevent Phishing Attacks with Multi-Factor Authentication

Phishing takes advantage of the weakest link in any organization’s cybersecurity system—-human behavior....

Privacy is a Key Enabler of Trust

How important is privacy in building and maintaining trust with customers? While more than 160 countries have omnibus privacy laws today, business leaders...

Malware evolution and Cyber threats

In the ever-evolving cybersecurity landscape, 2023 witnessed a dramatic surge in the sophistication of cyber threats and malware. AT&T Cybersecurity Alien Labs reviewed...

Latest articles