[R1] Nessus 10.1.0 Fixes One Third-Party Vulnerability
Nessus leverages third-party software to help provide underlying functionality. One of the third-party components (Underscore.js) was found to contain a vulnerability, and an updated version...
Beware! Facebook accounts being hijacked via Messenger prize phishing chats
Facebook users are being warned of a phishing campaign that tries to break into accounts, disguised as a Facebook Messenger chat from a friend. Read...
Securing Critical Infrastructure: The Essential Role of Public-Private Partnerships
Government collaboration with industry can help drive strategic planning and tactical operations to address cyberthreats. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) states, “Public-private...
Qubit pleads with hacker to return $80 million of stolen funds
Qubit, a decentralized finance (DeFi) platform, has publicly offered $2,000,000 to a hacker who stole $80 million worth of cryptocurrency from it last week. Read...
Twelve-Year-Old Linux Vulnerability Discovered and Patched
It’s a privilege escalation vulnerability: Linux users on Tuesday got a major dose of bad news — a 12-year-old vulnerability in a system tool called...
US Revokes China Unicom’s License
US Revokes China Unicom's License The US government has effectively stripped another Chinese telecoms player of its license to operate in the country on national...
Stories from the SOC – WannaCry malware
Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for...
Crypto Finance Firm Offers $2m Bug Bounty to Hackers
Crypto Finance Firm Offers $2m Bug Bounty to Hackers A decentralized lending platform that lost $80m to hackers has offered them an astonishing multimillion-dollar bug...
12 CISO resolutions for 2022
It’s still early days, but if this year is anything like years past, it’s safe to say CISOs will have a lot to contend with,...
DDoS attacks: Definition, examples, and techniques
What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a...