Month: April 2024

Intellectual property (IP) is the lifeblood of every organization. It didn’t used to be. As a result, now more than ever, it’s a target, placed squarely in the cross-hairs by various forms of cyber attack. Witness the long list of hacks on Hollywood and the entertainment industry’s IP including “Pirates of the Caribbean” and more recently HBO’s “Game…

Read More

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In a digital era marked by rapidly evolving threats, the complexity of cybersecurity challenges has surged, pressing organizations to evolve beyond traditional, tech-only…

Read More

Apr 16, 2024NewsroomPrivacy Breach / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company Cerebral from using or disclosing personal data for advertising purposes. It has also been fined more than $7 million over charges that it revealed users’ sensitive personal health information and other data to third parties for…

Read More

Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme to develop and distribute a remote access trojan called Hive RAT (previously Firebird). The U.S. Justice Department (DoJ) said the malware “gave the malware purchasers control over victim computers and enabled them to access victims’ private communications, their login…

Read More

If a company decides that it will not report certain information at this time, the company should do an exercise where it makes the assumption that the unannounced items do get announced. This exercise means that unannounced scenarios can’t be ignored. They must be seriously considered, if for no other reason than to improve the…

Read More

In today’s world, where information spreads at lightning speed, it’s easy to fall into the trap of misinformation. Amidst the noise, Google Fact Checking Tools aim to empower you with the ability to distinguish reliable sources from those perpetuating false claims. What are Google Fact Checking Tools? Google offers a suite of tools designed to…

Read More

Artificial intelligence (AI) is rapidly transforming various industries, and the world of literature is no exception. AI-powered writing assistants are becoming increasingly sophisticated, blurring the lines between human and machine-generated content. This begs the question: can AI write a book in its entirety, and if so, what are the implications for the future of authorship?…

Read More

10web — form_maker_by_10web_-_mobile-friendly_drag_&_drop_contact_form_builder  The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.15.22 via the signature functionality. This makes it possible for unauthenticated attackers to extract sensitive data including user signatures. 2024-04-09 5.9 CVE-2024-2112security@wordfence.comsecurity@wordfence.com adobe…

Read More

The evolution of ransomware attacks continues to pose a significant threat to businesses worldwide as they are becoming increasingly sophisticated. Protecting against ransomware requires robust strategies, including immutable storage targets, encrypted backups, routine backup verification, access limits, proactive monitoring, and comprehensive data recovery planning. These measures are essential for minimizing damage and ensuring quick recovery…

Read More

Palo Alto Networks has released workaround guidance for a command injection vulnerability (CVE-2024-3400) affecting PAN-OS versions 10.2, 11.0, and 11.1. Palo Alto Networks has reported active exploitation of this vulnerability in the wild.  CISA encourages users and administrators to review the Palo Alto Networks Security Advisory, apply the current mitigations, and update the affected software…

Read More