News

  • Victims Lose $47m to Crypto Phishing Scams in February

    Some 57,000 victims lost $47m in phishing scams targeting their cryptocurrency last month Read More

    Read More

  • Magnet Goblin Exploits Ivanti Vulnerabilities

    The threat actor uses custom Linux malware to pursue financial gain, according to Check Point Research Read More

    Read More

  • Incognito Darknet Market Mass-Extorts Buyers, Sellers

    Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from $100 to $20,000. The bold mass extortion attempt comes just days after Incognito Market administrators…

    Read More

  • BianLian Threat Actor Shifts Focus to Extortion-Only Tactics

    GuidePoint said the threat actor gained initial access via vulnerabilities in a TeamCity server Read More

    Read More

  • NSA Launches Top 10 Cloud Security Mitigation Strategies

    The advisory is associated with ten companion cybersecurity information sheets detailing how to implement each strategy Read More

    Read More

  • Third-Party Breach and Missing MFA Contributed to British Library Cyber-Attack

    A British Library report found the most likely source of the incident was the compromise of third-party account credentials and no MFA was in place to stop the attackers Read More

    Read More

  • Using LLMs to Unredact Text

    Initial results in using LLMs to unredact text based on the size of the individual-word redaction rectangles. This feels like something that a specialized ML system could be trained on. Read More

    Read More

  • Telemedicine Business Owner Faces 20 Years For $136m Fraud

    Nurse practitioner pleads guilty to $136m Medicare fraud plot involving her telemedicine companies Read More

    Read More

  • Incident readiness is crucial for state and local governments

    The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.   The current cybersecurity landscape: Navigating threats and safeguarding local government operations Local governments in the United States faced a surge in cyber threats…

    Read More

  • Russia’s Midnight Blizzard Accesses Microsoft Source Code

    Threat group APT29 is using secrets stolen in an earlier attack to compromise Microsoft’s internal systems Read More

    Read More

News, Advisories and much more

Exit mobile version