Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AT&T Cybersecurity

Conversational AI vs. generative AI: What's the difference?

In the intricate world of artificial intelligence, it's essential to distinguish between the different AI technologies at our disposal. Two key domains that often lead to confusion are conversational AI and generative AI. Though their names might sound related, they are fundamentally different in their applications and underlying mechanisms. Let's dive into the realm of AI to elucidate the distinctions between these two intriguing domains.

Data breaches: In-depth analysis, recovery strategies, and best practices

In the dynamic landscape of cybersecurity, organizations face the ever-present risk of data breaches. This article provides a detailed exploration of data breaches, delving into their nuances, and offers comprehensive recovery strategies along with best practices. A data breach occurs when unauthorized threat actors gain access to sensitive information, jeopardizing data integrity and confidentiality.

Can any measures stop the rise of tech scams?

Tech scams are continuing to grow in scale and damage. According to CBS News, Americans have reported over $2.7 billion in losses to tech scams from social media alone. Further losses are being accrued through other sources, too, of course; but with that figure coming from one source, alone, the scale of the problem is laid out quite clearly. As more of the nation moves to a digital-first footing, these attacks are only likely to increase in volume, and scale, too.

The best Cybersecurity conference you never heard of

For the past 12 years in Austin, TX, the last week of October has been reserved for the Lonestar Application Security Conference (LASCON). Unequivocally, LASCON is the best cybersecurity conference you have never heard of! LASCON is the annual confab of the Austin, TX OWASP (the Open Worldwide Application Security Project) chapter. OWASP is a volunteer organization that is a treasure trove of application security information with things such as standards, discussion groups, documentation, and more.

Unveiling the dark web: A professional's guide to ethical exploration

The dark web, often shrouded in mystery and intrigue, is a realm of the internet that exists beyond the reach of traditional search engines. While the Dark Web does harbor a certain notoriety for hosting illegal activities, it also contains valuable information and resources that can be beneficial for professionals involved in cybersecurity, threat intelligence, and investigations.

Behind the Scenes: JaskaGO's Coordinated Strike on macOS and Windows

In recent developments, a sophisticated malware stealer strain crafted in the Go programming language has been discovered by AT&T Alien Labs, posing a severe threat to both Windows and macOS operating systems. As of the time of publishing of this article, traditional antivirus solutions have low or even non-existent detection rates, making it a stealthy and formidable adversary.

Protecting the enterprise from dark web password leaks

Referenced in popular films and television programs, “The Dark Web” has achieved what many cyber security concerns fail to do in that it has entered the public consciousness. It is generally understood that the dark web is a collection of on-line sites and marketplaces, notorious for facilitating illegal activities and harboring stolen information.

What is data-centric security?

Data is the lifeblood of organizations. It drives decision-making, fosters innovation, and underpins business operations. However, this wealth of data is scattered across multiple cloud platforms, making it an attractive target for cybercriminals, and rendering traditional approaches to data protection obsolete. This is where data-centric security comes into play. This article will explore the concept of data-centric security, why businesses need it, and the benefits it offers.

What is Cybersecurity threat intelligence sharing

Knowledge is power and collaboration is key for organizations to continuously adapt and improve their security measures in order to stay ahead of cybercriminals. An effective way to stay ahead is by enhancing an organization's security posture through cybersecurity threat intelligence sharing.