Hackers stole call, text records of “nearly all” of AT&T’s cellular customers
Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to …
FCC fines major wireless carriers over illegal location data sharing
The Federal Communications Commission (FCC) fined the nation’s largest wireless carriers for illegally sharing access to customers’ location information without consent and …
AT&T data leaked: 73 million customers affected
AT&T has confirmed that the data set leaked on the dark web some two weeks ago does, indeed, contain “AT&T data-specific fields”. The company is reaching …
Macs are getting compromised to act as proxy exit nodes
AdLoad, well-known malware that has been targeting systems running macOS for over half a decade, has been observed delivering a new payload that – unbeknown to the …
Securing the rapidly developing edge ecosystem
In this Help Net Security video interview, Theresa Lanowitz, Head of Cybersecurity Evangelism at AT&T Business, discusses the 12th annual Cybersecurity Insights Report, …
Black Hat USA 2022 video walkthrough
In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal …
AT&T launches SASE with Cisco Meraki to help protect businesses from malicious web-based threats
AT&T is introducing AT&T SASE with Cisco Meraki designed to provide businesses of nearly any size and industry with a powerful networking and security offering. This …
CTIA 5G Security Test Bed assesses potential threats to 5G security
CTIA launched 5G Security Test Bed (STB), a security testing and validation initiative dedicated to commercial 5G networks. CTIA created the STB in partnership with …
Sequans Communications achieves CC EAL5+ certification for GSMA-compliant iUICC support
Sequans Communications announced that the GSMA-compliant integrated SIM (iUICC) is now Common Criteria certified and available on its second generation LTE-M/NB-IoT chip, …
Your supply chain: How and why network security and infrastructure matter
With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …
Hiya Adaptive AI: Hunting and stopping illegal callers in real-time
Hiya launched Adaptive AI, a new capability of Hiya Protect that marks a self-learning system that proactively hunts and shuts down illegal callers in real-time. Adaptive AI …
AT&T SASE with Cisco protects enterprises with SD-WAN technology and security capabilities
AT&T is expanding its global, managed Secure Access Service Edge (SASE) portfolio to include a new offering. AT&T SASE with Cisco is a converged network and security …
Featured news
Resources
Don't miss
- Microsoft fixes exploited zero-day (CVE-2024-49138)
- Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
- Preventing data leakage in low-node/no-code environments
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration