Cyber Security

Critical Bluetooth Flaw Exposes Android, Apple & Linux Devices to Takeover

Attackers can exploit a critical Bluetooth security vulnerability that's been lurking largely unnoticed for years on macOS, iOS, Android, and Linux device platforms....

ICANN Launches Service to Help With WHOIS Lookups – Krebs on Security

More than five years after domain name registrars started redacting personal data from all public domain registration records, the non-profit organization overseeing the...

What to know about deepfake-driven sextortion schemes

Cybercrime Criminals increasingly create deepfake nudes from people’s benign public photos in...

New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

The Cisco Talos Year in Review report released Tuesday highlights new trends in...

Top 29 data security best practices for your enterprise

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

$10 million up for grabs in fight against North Korean hackers

Fancy earning $10 million?Of course you do!Well, today could be your lucky day. Because the US State Department is offering a reward of...

Multiple NFT collections at risk by flaw in open-source library

A vulnerability in an open-source library that is common across the Web3 space impacts the security of pre-built smart contracts, affecting multiple NFT...

Unveiling the Threat of Malicious Browser Extensions

Dec 06, 2023The Hacker NewsBrowser Security / Privacy Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules...

Latest articles