Subscribe To Our Daily Enewsletter:

Posts by AT&T Cybersecurity

Google Cloud Platform Security Monitoring: AT&T Alien Labs Analysis

The latest threat intelligence for Google Cloud Platform (GCP) from AT&T Alien Labs. What it means for security practitioners & cloud IT professionals.

AT&T Alien Labs Analyzes Cryptomining Worm: The Findings

This blog post provides an overview of the AT&T Alien Labs™ technical analysis of the common malicious implants used by threat actors targeting vulnerable Exim, Confluence, and WebLogic servers.

Siegeware and BAS Attacks, an Emerging Threat

When attackers combine ransomware with BAS vulnerabilities, we get Siegeware. This malware has the potential to create life-threatening situations.

Security Through Transparency: The Key to Customer Trust

In today’s business market, being transparent is what will gain the trust of users regardless of the severity of a breach or incident. AT&T Cybersecurity explains.

How to Detect and Stop Phishing Attacks

After hackers penetrate a trusted account, they’ll launch an internal phishing or business email compromise (BEC) attack. Here’s how MSSPs can mitigate those attacks.

Cybersecurity Threats: Perception vs Reality

What are the biggest internal and external cybersecurity threats? AT&T Cybersecurity research results reveal key perceptions and data points.

MSSPs That Confuse Customers Will Lose Customers

Can MSSPs provide protect their customers while also communicating in a way that reduces confusion and eases the perceived pain of cybersecurity?

Using Misinformation For Security Awareness Engagement

How to use, yet not abuse, some of the best social engineering techniques to improve cybersecurity.

Cybersecurity Outsourcing Trends: Research Findings

Where are customers heading next with cybersecurity outsourcing plans? AT&T Cybersecurity research findings offer guidance.

Alert Fatigue? Try These Tuning Tips for Security Analysts

Leverage these tuning tips to reduce or elminate alert fatigue for security operations center (SOC) analysts, MSSPs & other cybersecurity processionals.