New Realst Mac malware, disguised as blockchain games, steals cryptocurrency wallets
Fake blockchain games, that are being actively promoted by cybercriminals on social media, are actually designed to infect the computers of unsuspecting Mac users with...
Backdoor in TETRA Police Radios
Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world. The European Telecommunications...
Ransomware Attacks Skyrocket in Q2 2023
SonicWall’s report finds that ransomware rebounded in Q2 2023 following a major reduction in Q1 Read More
USN-5807-3: libXpm vulnerability
USN-5807-1 fixed a vulnerability in libXpm. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Marco Ivaldi discovered that libXpm incorrectly...
How to improve employee phishing awareness
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Education Sector Has Highest Ransomware Victim Count
Extortionists know their targets have low tolerance for outages Read More
Over 900,000 MikroTik Routers Exposed to Critical Bug
Attackers could covertly gain remote control of devices Read More
Industry Coalition Calls For Enhanced Network Resilience
Alliance wants to improve visibility and patching Read More
CVE-2022-2502
A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if...
ZDI-23-982: Oracle VirtualBox VRDP Memory Corruption Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle VirtualBox. Authentication may or may not be required to exploit this...