The most recent posts from across the AlienVault blogs.
2k followers 3 articles/week
Stories from the SOC – Combating “Security Alert” Scams

Executive Summary The “Security Alert” scam is a prevalent tech-support fraud that threatens both Windows and Apple users. It exploits the trust of users by masquerading as an official support site, using fake pop-up warnings to lure users into dialing scam phone numbers by conveying a sense of urgency. The ultimate goal is gaining remote access...

Wed May 1, 2024 13:03
Volatile Data Acquisition from Live Linux Systems: Part I

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the domain of digital forensics, volatile data assumes a paramount role, characterized by its ephemeral nature. Analogous to fleeting whispers in a bustling...

Tue Apr 30, 2024 19:08
Enhancing Financial Security Through Behavioral Biometrics

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The evolution of tech necessitates stronger cybersecurity. Financial information is appealing to hackers trying to steal identities and commit fraud. These bad...

Mon Apr 29, 2024 17:58
Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime.

Understanding the factors influencing cybercriminal behavior is essential for developing effective cybercrime prevention strategies. Rationality plays a significant role in shaping criminal decisions, particularly through the lens of the rational actor model and deterrence theory. This blog explores how rationality influences cybercriminal behavior,...

Wed Apr 24, 2024 18:19
The Impact of UNECE R155 on Automotive Cybersecurity

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In an era where technology and transportation converge, the fusion of vehicles with IoT technologies heralds a new dawn of mobility. This leap forward promises...

Tue Apr 23, 2024 13:07
Bring Your Own Device: How to Educate Your Employees On Cybersecurity Best Practices

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  With the rise of remote and flexible work arrangements, Bring Your Own Device (BYOD) programs that allow employees to use their personal devices for work...

Mon Apr 22, 2024 13:02

Build your own newsfeed

Ready to give it a go?
Start a 14-day trial, no credit card required.

Create account