USN-5748-1: Sysstat vulnerability
It was discovered that Sysstat incorrectly handled certain arithmetic multiplications. An attacker could use this issue to cause Sysstat to crash, resulting in a denial...
What Are Tailgating Attacks and How to Protect Yourself From Them
Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you are in a safe environment....
CTA “mud” Actively Leaking K-12 Directories on Breach Forums
A cyber threat actor (CTA) on “Breach Forums” who's employing the username “Mud” is actively leaking K-12 entities’ student/faculty directories. Read More
Charles V of Spain Secret Code Cracked
Diplomatic code cracked after 500 years: In painstaking work backed by computers, Pierrot found “distinct families” of about 120 symbols used by Charles V. “Whole...
USN-5747-1: Bind vulnerabilities
It was discovered that Bind incorrectly handled large query name when using lightweight resolver protocol. A remote attacker could use this issue to consume resources,...
5 Tips for protecting your connected vehicle against Cyberattacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Police Shutter 13,000 Sites in Piracy Crackdown
Fourteen detained as part of Europol operation Read More
Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak
The fine followed an inquiry into data processing by Meta in response to a major data breach Read More
Experts Find 16,000+ Scam FIFA World Cup Domains
Social media ads and accounts help to drive traffic Read More
How to build a public profile as a cybersecurity pro
Cybersecurity professionals interested in raising their profiles as subject matter experts can count on social media to become more visible. With everyone being online this...