CTAs Using Adversary in the Middle (AiTM) Phishing Attacks
Cyber threat actors show no sign of curbing their Adversary in the Middle (AiTM) phishing attacks against SLTTs. Here's how to defend your organization. Read...
Stuxnet: The malware that cost a billion dollars to develop?
A report from the Netherlands claims that a Dutch man played a key role in the notorious Stuxnet worm attack against an Iranian nuclear facility,...
Turkish APT Sea Turtle Resurfaces, Spies on Dutch IT Firms
Turkey-aligned espionage group Sea Turtle has been conducting campaigns targeting Dutch telecommunication and media organizations Read More
Second Interdisciplinary Workshop on Reimagining Democracy
Last month, I convened the Second Interdisciplinary Workshop on Reimagining Democracy (IWORD 2023) at the Harvard Kennedy School Ash Center. As with IWORD 2022, the...
USN-6499-2: GnuTLS vulnerability
USN-6499-1 fixed vulnerabilities in GnuTLS. This update provides the corresponding update for Ubuntu 18.04 LTS. Original advisory details: It was discovered that GnuTLS had a...
North Korean Hackers Stole $600m in Crypto in 2023
North Korean hackers remain effective in stealing cryptocurrency despite growing international law enforcement action Read More
The Botnet siege: How your toaster could topple a corporation
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Merck Settles With Insurers Over $700m NotPetya Claim
Pharma giant Merck has reached a settlement with cyber-insurers that refused to pay out for “acts of war” Read More
Security Firm Certik’s Account Hijacked to Spread Crypto Drainer
Blockchain security firm Certik had its own social media account hacked to push a crypto scam Read More
GLSA 202401-11: Apache Batik: Multiple Vulnerabilities
Post Content Read More