Cyber Defense Advisors

Year: 2022

Automated Creation and CIDR Allocation for Subnets on AWS

ACM.64 Automating the creation of subnets an NACLS in AWS CloudFormation This is a continuation of my series on Automating Cybersecurity Metrics. We implemented our Public and Private VPCs and added VPC Flow Logs in the last few posts. Now we need to create Subnets and Network Access Control Lists (NACLs). What are subnets? They are a […]

Cyber News

Jamf Announces Intent to Acquire ZecOps, to Provide a Market-Leading Security Solution for Mobile Devices as Targeted Attacks Continue to Grow

ZecOps extends Jamf’s mobile security capabilities by adding advanced detections and incident response.

Cyber News

Cold War Bugging of Soviet Facilities

Found documents in Poland detail US spying operations against the former Soviet Union. The file details a number of bugs found at Soviet diplomatic facilities in Washington, D.C., New York, and San Francisco, as well as in a Russian government-owned vacation compound, apartments used by Russia personnel, and even Russian diplomats’ cars. And the bugs […]

Cyber News

Defend your organization from ransomware attacks with Cisco Secure Endpoint

Ransomware is one of the most dangerous threats organizations face today, so it’s no wonder that Cisco Talos Incident Response named it the top threat of the year in 2021. These attacks continue to grow and become more advanced, with ransomware attacks (see Figure 1 below).1  Stopping ransomware attacks isn’t easy either, as adversaries continue […]

Cyber News

Facebook Shuts Down Covert Political ‘Influence Operations’ from Russia and China

Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China and Russia for engaging in coordinated inauthentic behavior (CIB) so as to manipulate public debate. While the Chinese operation sets its sights on the U.S. and the Czech Republic, the Russian network primarily targeted Germany, France, Italy, Ukraine […]

Cyber News

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware. The technique “is designed to be triggered when the user starts the presentation mode and moves the mouse,” cybersecurity firm Cluster25 said in a technical report. “The code […]

Cyber News

How cybercriminals use public online and offline data to target employees

We post our daily lives to social media and think nothing of making key details about our lives public. We need to reconsider what we share online and how attackers can use this information to target businesses. Your firm’s security may be one text message away from a breach. How and why attackers target new […]

Cyber News

ICO Reprimands UK Organizations for GDPR Failings

Subject Access Requests experiencing significant delays

Cyber News

Stories from the SOC – C2 over port 22

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Extended Detection and Response customers. Executive summary The Mirai botnet is infamous for the impact and the everlasting effect it has had on the world. Since the inception […]

Cyber News