Balancing Your Healthcare Cybersecurity & Compliance Efforts
Need a way to streamline your healthcare cybersecurity and compliance efforts? Here's how resources from CIS can help your organization. Read More
Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims
Nexperia confirmed its IT servers were accessed by attackers, with the Dunghill ransomware group claiming to have stolen chip designs and other sensitive documents Read...
New Lattice Cryptanalytic Technique
A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since...
USN-6731-1: YARD vulnerabilities
It was discovered that YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks...
The Lifecycle of a Digital File
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
Zambia arrests 77 people in swoop on “scam” call centre
Law enforcement officers in Zambia have arrested 77 people at a call centre company they allege had employed local school-leavers to engage in scam internet...
FBI Warns of Massive Toll Services Smishing Scam
The Feds have received thousands of complaints about phishing texts from fake road toll collection services Read More
Police Swoop on €645m Cannabis Investment Fraud Gang
Nine arrests and millions of euros seized in bid to bust JuicyFields investment scammers Read More
ZDI-24-365: (Pwn2Own) Microsoft Edge DOMArrayBuffer Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that...
ZDI-24-366: (Pwn2Own) Google Chrome WASM Improper Input Validation Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Google Chrome. User interaction is required to exploit this vulnerability in that...