News

  • Detecting AI-Generated Text

    PRIVACY PRIVACY There are no reliable ways to distinguish text written by a human from text written by an large language model. OpenAI writes: Do AI detectors work? In short, no. While some (including OpenAI) have released tools that purport to detect AI-generated content, none of these have proven to reliably distinguish between AI-generated and…

    Read More

  • #mWISE: FBI Director Urges Greater Private-Public Collaboration Against Cybercrime

    PRIVACY PRIVACY FBI director Christopher Wray said that partnerships with the private sector have changed the FBI’s approach to fighting cybercrime Read More

    Read More

  • From one realm to another: Ensuring data protection in a cloud migration

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In today’s digital landscape, businesses are embracing the transformative power of cloud migration. Shifting operations from on-premises systems to cloud environments…

    Read More

  • Threat Actor Claims Major TransUnion Customer Data Breach

    PRIVACY PRIVACY Database compromise dates back to March 2022 Read More

    Read More

  • Clorox Struggling to Recover From August Cyber-Attack

    PRIVACY PRIVACY US manufacturer can’t say when operations will return to normal Read More

    Read More

  • Microsoft AI Researchers Leak 38TB of Private Data

    PRIVACY PRIVACY An overly permissive Shared Access Signature (SAS) token was to blame Read More

    Read More

  • Who’s Behind the 8Base Ransomware Website?

    PRIVACY PRIVACY The victim shaming website operated by the cybercriminals behind 8Base — currently one of the more active ransomware groups — was until earlier today leaking quite a bit of information that the crime group probably did not intend to be made public. The leaked data suggests that at least some of website’s code…

    Read More

  • Fraudsters Steal Over $1m in Three Weeks Through ‘Pig Butchering’ Crypto Scam

    PRIVACY PRIVACY Sophos researchers highlight a highly sophisticated operation utilizing fake trading pools of cryptocurrency from DeFi trading applications Read More

    Read More

  • Using Hacked LastPass Keys to Steal Cryptocurrency

    PRIVACY PRIVACY Remember last November, when hackers broke into the network for LastPass—a password database—and stole password vaults with both encrypted and plaintext data for over 25 million users? Well, they’re now using that data break into crypto wallets and drain them: $35 million and counting, all going into a single wallet. That’s a really…

    Read More

  • Unmasking antiforensics techniques: Strategies for effective defense

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Introduction: In the world of digital forensics, where experts meticulously analyze digital evidence to uncover the truth, a counterforce known as…

    Read More

News, Advisories and much more

Exit mobile version