FTC’s Voice Cloning Challenge
The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.”
Cyber News, Cyber Threat TrendsThe Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.”
Cyber News, Cyber Threat TrendsWithSecure report highlights widespread code reuse
Cyber News, Cyber Threat TrendsExecutive summary Multifactor authentication, or MFA, provides users with an added layer of security when logging into web applications. Surpassing its predecessor, two-factor authentication, in 2023, MFA is a standard option for another layer of security for online accounts. . In May 2022, the Cybersecurity & Infrastructure Security Agency (CISA) published security advisory AA22-074A describing how […]
Cyber News, Cyber Threat TrendsWho’s more incompetent – the cryptocurrency exchanges or some of the people who hack them? Plus a closer look at the reliability of AI chatbots. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Cyber News, Cyber Threat TrendsWhile the veteran unemployment rate may be at a historic low, the transition from the military to civilian life isn’t without its challenges. For starters, ex-military members often need help translating their skills gained in the armed forces to non-military roles, and many need to become more familiar with the wide variety of civilian career path […]
Cyber News, Cyber Threat TrendsThis is interesting: For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete compromise when naturally occurring computational errors occur while the connection is being established. […] The vulnerability occurs when there are errors during the signature generation that […]
Cyber News, Cyber Threat TrendsThe content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In a supply chain attack, hackers aim to breach a target’s defenses by exploiting vulnerabilities in third-party companies. These attacks typically follow one […]
Cyber News, Cyber Threat TrendsAnother two bugs in this month’s set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.
Cyber News, Cyber Threat Trends