USN-6529-1: Request Tracker vulnerabilities
It was discovered that Request Tracker incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input...
Cybercriminals Escalate Microsoft Office Attacks By 53% in 2023
The Kaspersky report also revealed an average detection of 411,000 malicious files per day Read More
Rust-Based Botnet P2Pinfect Targets MIPS Architecture
Cado Security found the variant while investigating files uploaded to an SSH honeypot Read More
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential theft, corporate network access, and...
EU Council and Parliament Reach Agreement on Cyber Resilience Act
The European institutions have finally resolved several contentious aspects of the Cyber Resilience Act Read More
AI and Trust
I trusted a lot today. I trusted my phone to wake me on time. I trusted Uber to arrange a taxi for me, and the...
How team collaboration tools and Cybersecurity can safeguard hybrid workforces
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Staples Hit With Disruption After Cyber-Attack
Retail giant’s service lines still impacted Read More
Russian Developer Pleads Guilty to Trickbot Conspiracy
40-year-old was extradited from South Korea Read More
US Confirms Iranian Attacks on Water Companies
State-backed CyberAveng3rs group hits Unitronics installations Read More