Cyber Defense Advisors

Year: 2022

10 Cybersecurity predictions for 2023

As we head into 2023, we look back at the last year and the focus will continue to be on reducing risk exposure and resilience. Organizations are strengthening their ransomware defense, security, and privacy approach to product development, cyberattack response, supply chain risk management and operational technology (OT) security and based on working with customers […]

Cyber News, Cyber Threat Trends

A Guide to Remove Malware From Your iPhone

Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated with a malware infection can range from poor device performance to stolen data.  However, thanks to their closed ecosystem, built-in security features, and strict policies on third-party apps, Apple devices tend to be less prone […]

Cyber News, Cyber Threat Trends

FBI: Beware of Cyber-Threat from Russian Hacktivists

Feds claim DDoS attacks are being aimed at critical infrastructure

Cyber News, Cyber Threat Trends

6 ways to reduce your IoT attack surface

As attackers target the ever-growing IoT attack surface, companies can reduce their risks with these six security best practices. The post 6 ways to reduce your IoT attack surface appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

ICO: Department for Education Should Have Been Fined £10m

DfE oversight leads to misuse of data on 28 million children

Cyber News, Cyber Threat Trends
  • by
  • November 7, 2022

Robin Banks Phishing Service for Cybercriminals Returns with Russian Server

A phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian provider of bulletproof hosting services. The switch comes after “Cloudflare disassociated Robin Banks phishing infrastructure from its services, causing a multi-day disruption to operations,” according to a report from cybersecurity company IronNet. Robin Banks was 

Cyber News, Cyber Threat Trends
  • by
  • November 6, 2022

Prefix Lists in Network Rules to Access AWS Services Without CIDRs

ACM.103 Provide access to S3 (and yum) in network rules without adding every S3 CIDR to maintain zero-trust networking This is a continuation of my series on Automating Cybersecurity Metrics. In the last post, I showed you how to access Git using a static IP addess (otherwise known as an EIP on AWS to add […]

Cyber News, Cyber Threat Trends
  • by
  • November 6, 2022

Bug in AWS IAM Console for User Groups

I was just updating my deployment script to add users to groups as part of my latest blog series on automated security metrics: Automating Cybersecurity Metrics (ACM) I added a user to the Developers group. I had an existing user named Developer, added a new user name Developer2 using my add to group code. After deploying my […]

Cyber News, Cyber Threat Trends
  • by
  • November 5, 2022

Limiting Access to an AWS EIP in GitHub

ACM.102 Ensuring only authorized IP addresses can access your private GitHub repositories This is a continuation of my series on Automating Cybersecurity Metrics. My last post explained how you can restrict SSH access on your local network to only authorized IP addresses. Local Firewall Rules to Connect to an AWS EIP via SSH Specifically, we […]

Cyber News, Cyber Threat Trends