Cyber Security

JaskaGO’s coordinated strike on macOS and Windows

Executive summary In recent developments, a sophisticated malware stealer strain crafted in the Go programming language has been discovered by AT&T Alien Labs, posing...

Phone hacking, Piers Morgan, and Carole’s Christmas cockup • Graham Cluley

Piers Morgan is less than happy after a judgement that there is “no doubt” he knew phone hacking was going on at the...

Fake F5 BIG-IP zero-day warning emails push data wipers

The Israel National Cyber Directorate warns of phishing emails pretending to be F5 BIG-IP zero-day security updates that deploy Windows and Linux data...

Memcyco’s Real-Time Defense Against Website Spoofing

Dec 20, 2023The Hacker NewsBrandjacking / Cyber Threat Hands-On Review: Memcyco's Threat Intelligence Solution Website impersonation, also known as brandjacking or website spoofing, has emerged...

ESO Solutions Notifies 2.7M of Data Breach

PRESS RELEASEMARLTON, N.J., Dec. 20, 2023 /PRNewswire/ -- Approximately 2.7 million patients are being notified that their Social Security numbers and other confidential information were compromised when an...

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its...

Why CISOs and CIOs Should Work Together More Closely

Although there are overlaps in the goals and responsibilities of the CIO and the CISO, there are also challenges that get in the...

Can any measures stop the rise of tech scams?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

Latest articles