France bans TikTok, all social media apps from government devices
The French government has banned TikTok and all other “recreational apps” from phones issued to its employees. The Minister of Transformation and the Public Service...
How often should security audits be?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites
Agency attempts to disrupt the cybercrime underground Read More
LSN-0093-1: Kernel Live Patch Security Notice
Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use...
Best practices for protecting AWS RDS and other cloud databases
It’s no surprise that organizations are increasingly using cloud-native services, including for data storage. Cloud storage offers tremendous benefits such as replication, geographic resiliency, and...
New BEC Tactics Enable Fake Asset Purchases
FBI warns of scammers using Net-30 and Net-60 terms Read More
Latitude Financial Admits Breach Impacted Millions
Over 14 million records stolen from consumer lender Read More
Align to a Framework: Plan a Cybersecurity Roadmap’s Route
Once you have an idea of where you are, you can decide where you want to go. A security framework is invaluable for this type...
USN-5972-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could...
CVE-2018-25083
The pullit package before 1.4.0 for Node.js allows OS Command Injection because eval is used on an attacker-supplied Git branch name. Read More