Millions Face RepoJacking Risk on GitHub Repositories
Aqua identified numerous high-profile targets, including organizations such as Google and Lyft Read More
Excel Data Forensics
In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics...
NSA Releases Guide to Mitigate BlackLotus Bootkit Infections
Microsoft patched exploited boot loader flaw but did not revoke trust in unpatched loaders Read More
Pilot data of American Airlines and Southwest stolen in data breach
A cybersecurity incident at a third-party vendor has impacted the personal information of pilots of at least two US airlines, including American Airlines and Southwest...
Blacktail: Unveiling the tactics of a notorious cybercrime group
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Companies Call for Changes to UK’s Cyber Essentials Scheme
Concerns over cost and one-size-fits-all approach Read More
How CISOs can balance the risks and benefits of AI
The rapid pace of change in AI makes it difficult to weigh the technology's risks and benefits and CISOs should not wait to take charge...
The CISO’s toolkit must include political capital within the C-suite
Over the past 18 months, there has been a bit of a sea change in the chief information security officer (CISO) role. Fundamentally, the CISO...
US Authorities Seize BreachForums Domain
Questions still to be answered over why it took so long Read More
Twitter Celeb Hacker Jailed For Five Years
Joseph O'Connor hijacked over 100 accounts in bitcoin scam Read More