Build a Robust Continuous Audit Program in 10 Steps
Want visibility of control deficiencies, potential fraud, and compliance issues? A continuous audit program can help. Here's how you can get started. Read More
Multiple Vulnerabilities in Notepad++ Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Notepad++, the most severe of which could result in arbitrary code execution. Notepad++ is a free and open-source text...
MGM Resorts Hit By Cyber-Attack, Systems Down
The incident disrupted key company services, impacting website, bookings and in-casino functions Read More
Cars Have Terrible Data Privacy
A new Mozilla Foundation report concludes that cars, all of them, have terrible data privacy. All 25 car brands we researched earned our *Privacy Not...
Fighting Individual Ransomware Strains Fruitless, UK Agencies Suggest
The report highlights the complex supply chain involved in ransomware attacks, requiring a more holistic approach to be taken by governments Read More
Resilient networks: Building blocks of modern Cybersecurity architecture
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Redfly Group Compromises National Power Grid
Symantec warns of mounting threat to critical infrastructure Read More
US Government Ordered to Urgently Patch Apple Zero-Day Bugs
Federal agencies have one month to fix BlastPass vulnerabilities Read More
Europol: Financial Crime Makes “Billions” and Impacts “Millions”
Policing group releases first ever report on the topic Read More
North Korean hackers targeting vulnerability researchers with zero-day attacks, Google warns
State-sponsored hackers, backed by the regime in North Korea, are believed to be using zero-day exploits to target cybersecurity researchers working in the field of...