China Poised to Disrupt US Critical Infrastructure with Cyber-Attacks, Microsoft Warns
Microsoft’s annual digital defense report found a rise in Chinese state-affiliated groups attempting to infiltrate sectors like medical infrastructure and telecommunication Read More
USN-6396-2: Linux kernel (KVM) vulnerabilities
It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local...
USN-6419-1: jQuery UI vulnerabilities
Hong Phat Ly discovered that jQuery UI did not properly manage parameters from untrusted sources, which could lead to arbitrary web script or HTML code...
Political Disinformation and AI
Elections around the world are facing an evolving threat from foreign actors, one that involves artificial intelligence. Countries trying to influence each other’s elections entered...
Record Numbers of Ransomware Victims Named on Leak Sites
A new Secureworks report finds that 2023 is on course to be the biggest year on record for victim naming on ‘name and shame’ sites...
Scammers Impersonate Companies to Steal Cryptocurrency from Job Seekers
CloudSEK warns 100,000 victims may have been impacted Read More
Gartner predicted APIs would be the #1 attack vector – Two years later, is it true?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
US Government Proposes SBOM Rules for Contractors
Public comment open until December 4 Read More
USN-6418-1: Node.js vulnerabilities
It was discovered that Node.js incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file,...
GoldDigger Android Trojan Drains Victim Bank Accounts
Researchers warn of phishing links leading to spoofed Google Play pages Read More