News

  • Smashing Security podcast #334: Acoustic attacks, and the tears of a crypto rapper

    PRIVACY PRIVACY Razzlekhan, the self-proclaimed Crocodile of Wall Street, pleads guilty to the biggest crypto laundering scheme in history, and just how safe are you typing while on a Zoom call? Meanwhile, Graham rants about public EV chargers. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by…

    Read More

  • #BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets

    PRIVACY PRIVACY A number of popular crypto wallet providers have been affected by the vulnerabilities, including Coinbase WaaS, Zengo and Binance Read More

    Read More

  • How to Create an Efficient Governance Control Program

    PRIVACY PRIVACY You need to account for several factors when building an efficient governance control program. Here’s how CIS SecureSuite can help. Read More

    Read More

  • Rhysida Ransomware Analysis Reveals Vice Society Connection

    PRIVACY PRIVACY Check Point highlighted the necessity of understanding the the entire attack process of ransomware groups Read More

    Read More

  • Breach Connected to MOVEit Flaw Affects Missouri Medicaid Recipients

    PRIVACY PRIVACY Information involved in the incident includes names, dates of birth and medical claims information Read More

    Read More

  • High-Severity Access Control Vulnerability Found in Spring WebFlux

    PRIVACY PRIVACY Tracked as CVE-2023-34034, the flaw has a CVSS score of 9.8 Read More

    Read More

  • Using Machine Learning to Detect Keystrokes

    PRIVACY PRIVACY Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy. “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards” Abstract: With recent developments in deep learning, the ubiquity of microphones and the rise in online services via personal devices, acoustic side channel attacks present a greater threat to…

    Read More

  • Northern Ireland Police Officers Vulnerable After Data Leak

    PRIVACY PRIVACY The accidental release of PSNI police officers’ names and department has raised huge safety fears Read More

    Read More

  • Mind the (Interpretation) gap: Another reason why threat modeling is important

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Where do vulnerabilities fit with respect to security standards and guidelines? Was it a coverage issue or an interpretation and implementation…

    Read More

  • This Election Season, Be on the Lookout for AI-generated Fake News

    PRIVACY PRIVACY It’s that time of year again: election season! You already know what to expect when you flip on the TV. Get ready for a barrage of commercials, each candidate saying enough to get you to like them but nothing specific enough to which they must stay beholden should they win.   What you might…

    Read More

News, Advisories and much more

Exit mobile version