News

  • Moroccan Charged With OpenSea NFT and Crypto Theft

    PRIVACY PRIVACY Individual allegedly used phishing website to harvest victim credentials Read More

    Read More

  • Man Charged With Remote Attack on Water Plant

    PRIVACY PRIVACY Individual accused of endangering health of Discovery Bay residents Read More

    Read More

  • E-commerce Fraud Surges By Over 50% Annually

    PRIVACY PRIVACY Online merchants plan to increase budgets and new hires Read More

    Read More

  • What Is Generative AI? How Does It Work?

    PRIVACY PRIVACY It’s all anyone can talk about. In classrooms, boardrooms, on the nightly news, and around the dinner table, artificial intelligence (AI) is dominating conversations. With the passion everyone is debating, celebrating, and villainizing AI, you’d think it was a completely new technology; however, AI has been around in various forms for decades. Only…

    Read More

  • RomCom Group Targets Ukraine Supporters Ahead of NATO Summit

    PRIVACY PRIVACY The BlackBerry team suspects spear-phishing as the primary vector utilized by the RomCom group Read More

    Read More

  • Crimeware Group Asylum Ambuscade Ventures Into Cyber-Espionage

    PRIVACY PRIVACY ESET researchers suggested Asylum Ambuscade has been active since 2020 Read More

    Read More

  • Android OS Tools Fuel Cybercrime Spree, Prey on Digital Users

    PRIVACY PRIVACY According to Resecurity, the trend poses challenges for online banking and payment systems Read More

    Read More

  • CIS Benchmarks July 2023 Update

    PRIVACY PRIVACY Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for July 2023. Read More

    Read More

  • Wisconsin Governor Hacks the Veto Process

    PRIVACY PRIVACY In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly unique in their specificity—to change a one-year funding increase into a 400-year funding increase. He took this wording: Section 402. 121.905 (3) (c) 9. of the…

    Read More

  • Unveiling the secrets: Exploring whitespace steganography for secure communication

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In the realm of data security, there exists a captivating technique known as whitespace steganography. Unlike traditional methods of encryption, whitespace…

    Read More

News, Advisories and much more

Exit mobile version