Majority of Security Managers Lack Threat Intelligence Skills
The report suggests threat intelligence is a crucial source for vulnerability detection Read More
The ‘Great Resignation’ Caused Insider Threats to Peak in Q3 2022, Kroll Finds
Kroll’s Q3 2022 Threat Landscape report showed an unprecedented increase in insider threats Read More
Update your Lenovo laptop’s firmware now! Flaws could help malware survive a hard disk wipe
PC manufacturer Lenovo has been forced to push out a security update to more than two dozen of its laptop models, following the discovery of...
An Untrustworthy TLS Certificate in Browsers
The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy: Google’s Chrome, Apple’s Safari, nonprofit Firefox and...
#IRISSCON: Cyber Professionals Now Tasked with Securing Society, Says Mikko Hyppönen
Mikko Hyppönen discusses how cyber-threats will become even more dangerous as reliance on connectivity grows Read More
USN-5709-2: Firefox vulnerabilities
USN-5709-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Multiple...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text message, email, or voicemail. These...
Some 98% of Global Firms Suffer Supply Chain Breach in 2021
Two-fifths still trust suppliers to handle their own security Read More
The pros and cons of the digital transformation in banking
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. macOS Ventura is the 19th and...