Cyber Defense Advisors

Year: 2023

Behind the Login Page: Inside the World of Web Application Testing

Behind the Login Page: Inside the World of Web Application Testing In an era where the digital landscape reigns supreme, web applications have become the backbone of our online experience. From social media platforms to e-commerce websites, these applications have become an integral part of our daily lives. However, what many users don’t realize is […]

Web Application Testing

Are You Covered? Cyber Insurance Readiness Assessments in an Age of Rising Threats

Are You Covered? Cyber Insurance Readiness Assessments in an Age of Rising Threats In a world that relies heavily on technology, where data flows like water, and businesses of all sizes are interconnected through intricate networks, the importance of cybersecurity cannot be overstated. The digital landscape has become a battleground, with cybercriminals constantly seeking new […]

Cyber Insurance Readiness Assessment

Against All Odds: Building Operational Resilience Programs for Modern Enterprises

Against All Odds: Building Operational Resilience Programs for Modern Enterprises In an era defined by rapid technological advancements, evolving cybersecurity threats, and unpredictable global events, the need for operational resilience in modern enterprises has never been more pressing. The ability to withstand disruptions, adapt to change, and continue delivering essential services is essential for survival […]

Operational Resilience Program

Above the Surface: The Significance of High-Level Risk Assessments in an Uncertain Era

Above the Surface: The Significance of High-Level Risk Assessments in an Uncertain Era In our rapidly evolving world, where change is the only constant, the importance of high-level risk assessments cannot be overstated. These assessments serve as a critical tool for individuals, organizations, and governments to navigate the uncertain waters of our era. As we […]

High-Level Risk Assessment
  • by
  • December 16, 2023

China’s MIIT Introduces Color-Coded Action Plan for Data Security Incidents

China’s Ministry of Industry and Information Technology (MIIT) on Friday unveiled draft proposals detailing its plans to tackle data security events in the country using a color-coded system. The effort is designed to “improve the comprehensive response capacity for data security incidents, to ensure timely and effective control, mitigation and elimination of hazards and losses […]

Cyber News
  • by
  • December 16, 2023

Microsoft Warns of Storm-0539: The Rising Threat Behind Holiday Gift Card Frauds

Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it’s tracking as Storm-0539 for orchestrating gift card fraud and theft via highly sophisticated email and SMS phishing attacks against retail entities during the holiday shopping season. The goal of the attacks is to propagate booby-trapped links that direct victims to […]

Cyber News
  • by
  • December 15, 2023

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: squid Sidebar photo of Bruce Schneier by Joe MacInnis.  

Cyber News
  • by
  • December 15, 2023

Gang charged with running $80 million “pig butchering” cryptocurrency investment scam

US authorities have charged four people for their alleged roles in a fraudulent cryptocurrency investment scheme that cost victims more than $80 million. Lu Zhang, a 36-year-old woman from Alhambra, California; Justin Walker, 31, of Cypress, California; Joseph Wong, 32, of Rosemead, California; and 40-year-old Hailong Zhu, of Naperville, Illinois, have all been charged in […]

Cyber News
  • by
  • December 15, 2023

New KV-Botnet Targeting Cisco, DrayTek, and Fortinet Devices for Stealthy Attacks

A new botnet consisting of firewalls and routers from Cisco, DrayTek, Fortinet, and NETGEAR is being used as a covert data transfer network for advanced persistent threat actors, including the China-linked threat actor called Volt Typhoon. Dubbed KV-botnet by the Black Lotus Labs team at Lumen Technologies, the malicious network is an amalgamation of two […]

Cyber News