Cyber Security

Israel Battles Spike in Wartime Hacktivist, OT Cyberattacks

For Israel, 2023 will be remembered as the beginning of the war in Gaza after the devastating Hamas terror attacks on Oct. 7....

Cables that you didn’t know about!

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions,...

The law enforcement operations targeting cybercrime in 2023

In 2023, we saw numerous law enforcement operations targeting cybercrime operations, including cryptocurrency scams, phishing attacks, credential theft, malware development, and ransomware attacks. While...

10 Years After Yahoo, What’s Changed? (Not Much)

In September 2016, Yahoo copped to a breach of 500 million user records. Even today it's one of the top five biggest data...

Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in ‘Incognito Mode’

Jan 02, 2024NewsroomData Privacy / Online Tracking Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled...

The Definitive Enterprise Browser Buyer’s Guide

Jan 02, 2024The Hacker NewsBrowser Security / Threat Protection Security stakeholders have come to realize that the prominent role the browser has in the...

New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections

Jan 01, 2024NewsroomWindows Security / Vulnerability Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that...

Android game dev’s Google Drive misconfig highlights cloud security risks

Japanese game developer Ateam has proven that a simple Google Drive configuration mistake can result in the potential but unlikely exposure of sensitive...

New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security

Jan 01, 2024NewsroomEncryption / Network Security Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network protocol...

Latest articles