CVE-2017-15109
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any...
CVE-2017-15106
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any...
CVE-2017-12152
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any...
Ransomware, email compromise are top security threats, but deepfakes increase
While ransomware and business email compromise (BEC) are leading causes of security incidents for businesses, geopolitics and deepfakes are playing an increasing role, according to...
Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South Asia
The groups' attacks were reportedly relatively low in sophistication but persistent and well-resourced Read More
Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan
The phishing emails contained Microsoft Word documents that exploited the CVE-2017-11882 flaw Read More
Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing Campaigns
LogoKit is based on JavaScript and can change logos and text on landing pages in real-time Read More
NIST’s Post-Quantum Cryptography Standards
Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit)...
Stories from the SOC – Credential compromise and the importance of MFA
Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for...
North Korean Hackers Target Crypto Job Seekers
New social engineering campaign leverages Coinbase Read More