10 Ways to spot a phishing attempt
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Estonian Duo Arrested for Masterminding $575m Ponzi Scheme
US authorities unseal 18-count indictment Read More
Know thy enemy: thinking like a hacker can boost cybersecurity strategy
As group leader for Cyber Adversary Engagement at MITRE Corp., Maretta Morovitz sees value in getting to know the enemy – she can use knowledge...
Experts Warn Threat Actors May Abuse Red Team Tool Nighthawk
C2 framework could be the next Cobalt Strike, says Proofpoint Read More
Credential Stuffers Steal $300K from DraftKings Customers
Complaints about poor customer service flood Twitter Read More
Alert (AA22-321A): #StopRansomware: Hive Ransomware
FortiGuard Labs is aware of that the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and...
Joint CyberSecurity Advisory on a U.S. Federal Agency Breached by Iranian Threat Actors
FortiGuard Labs is aware of a joint advisory (AA22-320A) issued by Cybersecurity and Infrastructure security Agency (CISA) and the Federal Bureau of Investigation (FBI) on...
APT Billbug Victimized Asian Certification Authority and Government Agencies
FortiGuard Labs is aware of a report that APT group "Billbug" compromised a certificate authority (CA) as well as multiple government and defense organizations in...
ZDI-22-1647: Microsoft Exchange PEFile Exposed Dangerous Function Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1648: Microsoft Exchange TraceFile Exposed Dangerous Function Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. Read More