Category: Chatgpt

MS-ISAC ADVISORY NUMBER: 2024-018 DATE(S) ISSUED: 02/08/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of…

Read More

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In our digitized world, online banking has become an integral part of managing your finances, offering unparalleled convenience. However, with this convenience comes…

Read More

AI is among the most disruptive technologies of our time. While AI/ML has been around for decades, it has become a hot topic with continued innovations in generative AI (GenAI) from start-up OpenAI to tech giants like Microsoft, Google, and Meta. When large language models (LLMs) combined with big data and behavior analytics, AI/ML can…

Read More

AI is among the most disruptive technologies of our time. While AI/ML has been around for decades, it has become a hot topic with continued innovations in generative AI (GenAI) from start-up OpenAI to tech giants like Microsoft, Google, and Meta. When large language models (LLMs) combined with big data and behavior analytics, AI/ML can…

Read More

Anyone that utilizes technology in their daily lives understands that it is ever-changing, and the sentiment is especially true within the cybersecurity industry. Adversaries continue to evolve with new tactics to bypass defenses, so it is necessary that the methods of detecting and preventing these threats do so at an even more rapid pace. However,…

Read More

Brett Johnson has been called the Godfather of cyber crime. He was on the FBI’s most-wanted list. And he was on What the Hack before! He returns for a freewheeling conversation about what’s new in cybercrime, how it’s changed and wants you to know how to better protect your digital life. This week’s episode is…

Read More

Here at AT&T Cybersecurity, we know  that the technology powering our managed detection and response services is solid—and we’ve got documentation to prove it. But we also know you’ve probably read your share of marketing materials making claims with nothing to back them up, so when we get the opportunity to share third-party metrics that support…

Read More

‘Cyber insecurity’ is among the most pressing issues facing organizations globally in 2024, according to new research from the World Economic Forum (WEF). In its Global Cybersecurity Outlook 2024 report, the WEF found that more than eight in ten organizations surveyed feel more or as exposed to cyber crime than last year. How can businesses implement…

Read More

MS-ISAC ADVISORY NUMBER: 2024-020 DATE(S) ISSUED: 02/13/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or…

Read More

Romance scammers spend a lot of time on dating apps, but they almost never meet their targets in person. Christina’s Mr. Right moved quickly. Charming in-person, he lived in the same area and worked in the same industry. It was only after she committed to building a new life with him in Florida that everything…

Read More