USN-6359-1: file vulnerability
It was discovered that file incorrectly handled certain malformed files. An attacker could use this issue to cause a denial of service, or possibly execute...
Windows Systems Targeted in Multi-Stage Malware Attack
According to Fortinet security expert Cara Lin, the attack begins with a phishing email Read More
Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends
SlashNext research shows that most of these tools connect to jailbroken versions of public chatbots Read More
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Google Chrome is a web browser used to access the...
Build a Robust Continuous Audit Program in 10 Steps
Want visibility of control deficiencies, potential fraud, and compliance issues? A continuous audit program can help. Here's how you can get started. Read More
Multiple Vulnerabilities in Notepad++ Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Notepad++, the most severe of which could result in arbitrary code execution. Notepad++ is a free and open-source text...
MGM Resorts Hit By Cyber-Attack, Systems Down
The incident disrupted key company services, impacting website, bookings and in-casino functions Read More
Cars Have Terrible Data Privacy
A new Mozilla Foundation report concludes that cars, all of them, have terrible data privacy. All 25 car brands we researched earned our *Privacy Not...
Fighting Individual Ransomware Strains Fruitless, UK Agencies Suggest
The report highlights the complex supply chain involved in ransomware attacks, requiring a more holistic approach to be taken by governments Read More
Resilient networks: Building blocks of modern Cybersecurity architecture
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...