News

  • New LockBit Variant Exploits Self-Spreading Features

    Kaspersky also uncovered the use of the SessionGopher script to extract saved passwords Read More

    Read More

  • Crickets from Chirp Systems in Smart Lock Key Leak

    The U.S. government is warning that “smart locks” securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock’s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Meanwhile, Chirp’s parent company, RealPage,…

    Read More

  • Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks

    Designated CVE-2024-3400 and with a CVSS score of 10.0, the flaw enables unauthorized actors to execute arbitrary code on affected firewalls Read More

    Read More

  • How Do You Manage Your Social Media Privacy?

    ‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit then you’ll know this is one of my top online safety tips. I’m a fan of ensuring that what you (and your kids) share online is limited to only the eyes that you trust. But…

    Read More

  • Balancing Your Healthcare Cybersecurity & Compliance Efforts

    Need a way to streamline your healthcare cybersecurity and compliance efforts? Here’s how resources from CIS can help your organization. Read More

    Read More

  • Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims

    Nexperia confirmed its IT servers were accessed by attackers, with the Dunghill ransomware group claiming to have stolen chip designs and other sensitive documents Read More

    Read More

  • New Lattice Cryptanalytic Technique

    A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum cryptographic algorithms, since many of them base their security on hard lattice problems. A few things to note. One, this paper has not yet been peer reviewed. As this comment points out: “We…

    Read More

  • The Lifecycle of a Digital File

    The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the digital world, every document, image, video, or program we create leaves a trail. Understanding the lifecycle of a file, from its…

    Read More

  • Zambia arrests 77 people in swoop on “scam” call centre

    Law enforcement officers in Zambia have arrested 77 people at a call centre company they allege had employed local school-leavers to engage in scam internet users around the world. Read more in my article on the Hot for Security blog. Read More

    Read More

  • FBI Warns of Massive Toll Services Smishing Scam

    The Feds have received thousands of complaints about phishing texts from fake road toll collection services Read More

    Read More

News, Advisories and much more

Exit mobile version