Increasingly sophisticated infostealers are targeting macOS with the capability to evade Apple's built-in malware protection, as attackers are becoming more savvy about how...
This is part two of a three-part series written by AT&T Cybersecurity evangelist Theresa Lanowitz. It’s intended to be future-looking, provocative, and encourage...
There's a wide range of AI-enabled solutions available for various business use cases, and organizations are increasingly recognizing their value. According to a...
Jan 17, 2024NewsroomBotnet / Cloud Security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned that threat...
A max-critical unauthenticated remote code execution (RCE) vulnerability is impacting Atlassian Confluence Data Center and Confluence Server, in all versions released before Dec....
A set of nine vulnerabilities, collectively called 'PixieFail,' impact the IPv6 network protocol stack of Tianocore's EDK II, the open-source reference implementation of...
Jan 17, 2024NewsroomVulnerability / Software Security
GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be...
A critical vulnerability has been discovered in the widely used, Web-connected Bosch BCC100 thermostat, which is a popular device in hospitality environments.Exploiting this...