Cyber Defense Advisors

Month: August 2023

North Korean Hackers Compromise Russian Missile Maker

NPO Mashinostroyeniya is under sanctions for supporting Kremlin war machine

Cyber News, Cyber Threat Trends

North Korean Hackers Compromise Russian Missile Maker

NPO Mashinostroyeniya is under sanctions for supporting Kremlin war machine

Cyber News, Cyber Threat Trends

Over 200 Million Brits Have Data Compromised in Four Years

Nearly 100,000 breaches were reported to the ICO between 2019 and 2022

Cyber News, Cyber Threat Trends

Over 200 Million Brits Have Data Compromised in Four Years

Nearly 100,000 breaches were reported to the ICO between 2019 and 2022

Cyber News, Cyber Threat Trends
  • by
  • August 8, 2023

Apple Users See Big Mac Attack, Says Accenture

Accenture’s Cyber Threat Intelligence unit has observed a tenfold rise in Dark Web threat actors targeting macOS since 2019, and the trend is poised to continue.

Cyber News, Cyber Threat Trends
  • by
  • August 8, 2023

Ransomware Victims Surge as Threat Actors Pivot to Zero-Day Exploits

Threat actors such as the operators of the Cl0p ransomware family increasingly exploit unknown and day-one vulnerabilities in their attacks.

Cyber News, Cyber Threat Trends
  • by
  • August 8, 2023

How LLMs are making red and blue teams more efficient

Security expert Evan Pena uses large language models (LLMs) almost daily “to confirm answers or come up with other ideas about how to investigate a vulnerability.” These natural language processing (NLP) tools that rely on artificial neural networks can generate text or code almost like humans, and they can also recognize patterns. Tapping into their […]

Cyber News, Cyber Threat Trends
  • by
  • August 8, 2023

LOLBAS in the Wild: 11 Living-Off-The-Land Binaries Used for Malicious Purposes

Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) that could be maliciously abused by threat actors to conduct post-exploitation activities.  “LOLBAS is an attack method that uses binaries and scripts that are already part of the system for malicious purposes,” Pentera security researcher Nir Chako said. “This makes it hard for security teams

Cyber News, Cyber Threat Trends