Cyber Security

Part 1: Transforming Cybersecurity Through Digital Forensics – Aghiath Chbib

Cyber security breaches have become rapidly one of the main concerns among all kinds of organizations. Even though companies are investing in complex new...

Steganography: The Secret Art of Concealment

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or...

Python Developers Under Attack by Malicious Package – Be4Sec

In a recent report by cybersecurity firm Checkmarx, researchers have uncovered a new wave of malware targeting developers working with the widely-used Python language....

Aghiath Chbib: Exploring the Theory and Facts

Blockchain Security: The Theory and The Facts In whatever place we look at we always read the same story: how Blockchain is a new technology...

Discovering Vulnerabilities: The Role of Scanners in Cybersecurity | Acunetix

DAST vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of...

Who has control over this life?

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse...

Forecasting Google Cloud’s Cybersecurity in 2024: Be4Sec

Google Cloud posted a forecast report for 2024 predictions about 2024. The report discusses the impact of new technologies on both attackers and defenders...

Achieve Success in AppSec Training with These Four Steps

Four Steps to Help You Tackle AppSec Training—and Succeed Teams across the SDLC are grappling with resource constraints, accumulated technical debt, skills gaps, and tight...

5 Recent Game-Changing Events in Cybersecurity – Aghiath Chbib

The long-running struggle between cybersecurity and hackers has existed in computing since the beginning of the 1970s. Its impact on users and businesses...

Latest articles