CISA Unveils Healthcare Cybersecurity Guide
The guide outlines mitigation strategies and best practices to counteract prevalent cyber-threats Read More
Infostealer Lumma Evolves With New Anti-Sandbox Method
Outpost24 explained the technique relies on trigonometry to discern genuine human behavior Read More
USN-6489-1: Tang vulnerability
Brian McDermott discovered that Tang incorrectly handled permissions when creating/rotating keys. A local attacker could possibly use this issue to read the keys. Read More
USN-6490-1: WebKitGTK vulnerabilities
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker...
USN-6488-1: strongSwan vulnerability
Florian Picca discovered that strongSwan incorrectly handled certain DH public values. A remote attacker could use this issue to cause strongSwan to crash, resulting in...
USN-6487-1: Avahi vulnerabilities
Evgeny Vereshchagin discovered that Avahi contained several reachable assertions, which could lead to intentional assertion failures when specially crafted user input was given. An attacker...
openvpn-2.6.8-1.fc39
FEDORA-2023-d9d55a0bfc Packages in this update: openvpn-2.6.8-1.fc39 Update description: This is an extended update of the OpenVPN 2.6.7 release which contains security fixes for CVE-2023-46849 and...
openvpn-2.6.8-1.fc38
FEDORA-2023-e4df33666c Packages in this update: openvpn-2.6.8-1.fc38 Update description: This is an extended update of the OpenVPN 2.6.7 release which contains security fixes for CVE-2023-46849 and...
Using Generative AI for Surveillance
Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My...
How to perform basic digital forensics on a Windows computer
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...