BrandPost: The Next Big Attack Vector: Your Supply Chain
There’s an old security adage: a chain is only as strong as its weakest link. The sentiment long predates Information and Communications Technology (ICT), but...
curl-7.85.0-5.fc37
FEDORA-2022-d7ee33d4ad Packages in this update: curl-7.85.0-5.fc37 Update description: smb/telnet: fix use-after-free when HTTP proxy denies tunnel (CVE-2022-43552) http: use the IDN decoded name in HSTS...
curl-7.82.0-12.fc36
FEDORA-2022-9836111c44 Packages in this update: curl-7.82.0-12.fc36 Update description: smb/telnet: fix use-after-free when HTTP proxy denies tunnel (CVE-2022-43552) http: use the IDN decoded name in HSTS...
US Most Impacted by Data Breaches in the Financial Industry in 2022
While 57% of these breaches were attributed to different types of malware, ATM skimming still accounted for 6.5% of all attacks targeting the financial sector...
Ukraine Intercepting Russian Soldiers’ Cell Phone Calls
They’re using commercial phones, which go through the Ukrainian telecom network: “You still have a lot of soldiers bringing cellphones to the frontline who want...
Top bug bounty platforms for organizations to improve security
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
UK Security Agency Wants Fresh Approach to Combat Phishing
NCSC says "blame and fear" won’t work Read More
Social media use can put companies at risk: Here are some ways to mitigate the danger
We live in a social world, but should our businesses? For many, the answer to that is increasingly no—that's why laws and regulations have recently...
Adult Google Ad Fraud Campaign Garnered Millions of Impressions
Fraudster used "popunders" and obfuscation to generate cash Read More
Godfather Trojan Targets 400 Financial Services Firms
Mobile banking malware designed to steal bank and crypto credentials Read More