Cyber Security

So How do You Electrify the World’s Largest Single-Owner Vehicle Fleet?

As the old joke goes . . . ‘you do it carefully!’ As part of the U.S. Federal Government’s journey to net zero, the...

How prepared is your company for a supply chain attack?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

Investigating data exfiltration… – Sophos News

On our new Sophos X-Ops video channel, Robert Weiland of the Incident Response team walks viewers through a data-exfiltration investigation, starting with an...

How hackers are breaching Booking.com, and the untrustworthy reviews • Graham Cluley

Workers wonder if their colleagues are actually AI, and we take a deeper look into the curious scams going on via Booking.com. All this...

Enhanced Google Play Protect real-time scanning for app installs

Posted by Steve Kafka, Group Product Manager and Roman Kirillov, Senior Engineering Manager Mobile devices have supercharged our modern lives, helping us do everything...

WP Fastest Cache plugin bug exposes 600K WordPress sites to attacks

The WordPress plugin WP Fastest Cache is vulnerable to an SQL injection vulnerability that could allow unauthenticated attackers to read the contents of the site’s...

New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments

Nov 15, 2023NewsroomVulnerability / Hardware Security Intel has released fixes to close out a high-severity flaw codenamed Reptar that impacts its desktop, mobile, and...

Danish Energy Attacks Portend Targeting More Critical Infrastructure

In May, 22 Danish energy sector organizations were compromised in an onslaught of attacks partially linked with Russia's Sandworm APT.A new report from...

Latest articles