-
New LockBit Variant Exploits Self-Spreading Features
Kaspersky also uncovered the use of the SessionGopher script to extract saved passwords Read More
-
Crickets from Chirp Systems in Smart Lock Key Leak
The U.S. government is warning that “smart locks” securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock’s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Meanwhile, Chirp’s parent company, RealPage,…
-
Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks
Designated CVE-2024-3400 and with a CVSS score of 10.0, the flaw enables unauthorized actors to execute arbitrary code on affected firewalls Read More
-
How Do You Manage Your Social Media Privacy?
‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit then you’ll know this is one of my top online safety tips. I’m a fan of ensuring that what you (and your kids) share online is limited to only the eyes that you trust. But…
-
Balancing Your Healthcare Cybersecurity & Compliance Efforts
Need a way to streamline your healthcare cybersecurity and compliance efforts? Here’s how resources from CIS can help your organization. Read More
-
Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims
Nexperia confirmed its IT servers were accessed by attackers, with the Dunghill ransomware group claiming to have stolen chip designs and other sensitive documents Read More
-
New Lattice Cryptanalytic Technique
A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems. A few things to note. One, this paper has not yet been peer reviewed. As this comment points out: “We…
-
The Lifecycle of a Digital File
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the digital world, every document, image, video, or program we create leaves a trail. Understanding the lifecycle of a file, from its…
-
Zambia arrests 77 people in swoop on “scam” call centre
Law enforcement officers in Zambia have arrested 77 people at a call centre company they allege had employed local school-leavers to engage in scam internet users around the world. Read more in my article on the Hot for Security blog. Read More
-
FBI Warns of Massive Toll Services Smishing Scam
The Feds have received thousands of complaints about phishing texts from fake road toll collection services Read More