- Cyber Safety
- Posts
- Cybersecurity Skills Gap, AT&T’s Data Breach & More
Cybersecurity Skills Gap, AT&T’s Data Breach & More
Think cybersecurity is only for the big guys? Think again. Startups and small businesses can protect customer data without draining their wallets. The key is focusing on the essentials—like collecting only what you need, encrypting it, and educating your team.
• Use strong passwords, encryption, and MFA to secure sensitive data without premium tools
• Cloud-based storage, automated backups, and DLP software offer robust protection at low cost
• Ongoing employee training builds a culture of privacy that prevents breaches before they start
🔐 Security doesn’t have to be pricey—just smart. Here's how to do more with less.
Find out why 1M+ professionals read Superhuman AI daily.
In 2 years you will be working for AI
Or an AI will be working for you
Here's how you can future-proof yourself:
Join the Superhuman AI newsletter – read by 1M+ people at top companies
Master AI tools, tutorials, and news in just 3 minutes a day
Become 10X more productive using AI
Join 1,000,000+ pros at companies like Google, Meta, and Amazon that are using AI to get ahead.

May 2025 brings an exciting lineup of open-source cybersecurity tools that are making waves in the security landscape! Here’s a quick look at the standout solutions:
• Vuls: An agentless vulnerability scanner that simplifies vulnerability management for server admins.
• LlamaFirewall: A modular security framework for AI applications, combating risks like jailbreaking and insecure outputs.
• Hanko: A passwordless API-first authentication tool designed for modern security needs.
• Cerbos: An intuitive solution for modern access control in cloud-native environments.
Stay updated with these innovative tools to bolster your cybersecurity defenses!

The cybersecurity skills gap is widening, threatening organizations and individuals alike. Here’s why this issue demands urgent attention:
• Workforce Growth: Global cybersecurity jobs surged by 12.6%, but there’s still a deficit of 4 million professionals.
• Increased Complexity: Rapid tech advancements mean heightened specialization is needed to combat sophisticated cybercriminals.
• Educational Reform: Traditional degree paths are shifting towards skill-based hiring and accessible, hands-on training.
Encouraging younger generations to embrace cybersecurity through early education and practical programs can help bridge this gap. With proactive strategies, we can cultivate the next wave of defenders for our digital landscape.
Daily News for Curious Minds
Be the smartest person in the room by reading 1440! Dive into 1440, where 4 million Americans find their daily, fact-based news fix. We navigate through 100+ sources to deliver a comprehensive roundup from every corner of the internet – politics, global events, business, and culture, all in a quick, 5-minute newsletter. It's completely free and devoid of bias or political influence, ensuring you get the facts straight. Subscribe to 1440 today.

Cybercriminals are at it again! They’ve exploited vulnerabilities in the SimpleHelp remote monitoring tool to unleash DragonForce ransomware through a managed service provider (MSP). Here are the critical points:
• Attack Method: Breached MSP via SimpleHelp’s vulnerabilities.
• Tools Used: Attackers exploited CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726.
• Impact: Multiple organizations fell victim to the ransomware, suffering data exfiltration and encryption.
• Defense: Sophos XDR protection thwarted one attack, emphasizing robust cybersecurity measures.
With the rise of DragonForce, it’s crucial for organizations using SimpleHelp to swiftly implement security updates and protective strategies!

A significant data breach is shaking up AT&T’s reputation, with hackers allegedly leaking 31 million customer records on a dark web forum. The exposed data, totaling 3.1GB, raises alarms about personal information security. Here are some shocking highlights:
• Contents of the breach: Full names, birth dates, tax IDs, device IDs, and contact information
• Previous breaches: A history of data leaks with millions affected
• Potential risks: Identity theft and financial fraud possibilities
As cybersecurity experts investigate, AT&T has yet to respond, leaving customers anxious about their private information's safety.

A nefarious cyber espionage campaign led by the Velvet Chollima APT group is targeting South Korean government officials using weaponized PDFs. This sophisticated operation has swept across continents, employing advanced social engineering tactics that make it harder for victims to detect the attack. Key points include:
• Spear-phishing emails with malicious PDF attachments.
• Attackers impersonating legitimate officials to build trust.
• A deceptive fake CAPTCHA technique that tricks users into executing harmful commands.
This innovative approach not only exploits human psychology but ensures persistent access to compromised systems, marking a worrying evolution in cyber threats.