Cyber Defense Advisors

Year: 2023

  • by
  • December 13, 2023

BazaCall Phishing Scammers Now Leveraging Google Forms for Deception

The threat actors behind the BazaCall call back phishing attacks have been observed leveraging Google Forms to lend the scheme a veneer of credibility. The method is an “attempt to elevate the perceived authenticity of the initial malicious emails,” cybersecurity firm Abnormal Security said in a report published today. BazaCall (aka BazarCall), which was first […]

Cyber News
  • by
  • December 13, 2023

Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities

Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android operating system and preventing specific kinds of vulnerabilities. This comprises Integer Overflow Sanitizer (IntSan) and BoundsSanitizer (BoundSan), both of which are part of UndefinedBehaviorSanitizer (UBSan), a tool designed to catch various kinds of undefined behavior […]

Cyber News
  • by
  • December 13, 2023

Surveillance by the US Postal Service

This is not about mass surveillance of mail, this is about the sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves: To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, […]

Cyber News
  • by
  • December 13, 2023

How to Analyze Malware’s Network Traffic in A Sandbox

Malware analysis encompasses a broad range of activities, including examining the malware’s network traffic. To be effective at it, it’s crucial to understand the common challenges and how to overcome them. Here are three prevalent issues you may encounter and the tools you’ll need to address them. Decrypting HTTPS traffic Hypertext Transfer Protocol Secure (HTTPS), […]

Cyber News
  • by
  • December 13, 2023

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks. “Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious activity,” the Microsoft Threat Intelligence team said in […]

Cyber News
  • by
  • December 13, 2023

Major Cyber Attack Paralyzes Kyivstar – Ukraine’s Largest Telecom Operator

Ukraine’s biggest telecom operator Kyivstar has become the victim of a “powerful hacker attack,” disrupting customer access to mobile and internet services. “The cyberattack on Ukraine’s #Kyivstar telecoms operator has impacted all regions of the country with high impact to the capital, metrics show, with knock-on impacts reported to air raid alert network and banking […]

Cyber News

How CIS-Based Risk Assessments Can Safeguard Your Company’s Digital Fortitude

How CIS-Based Risk Assessments Can Safeguard Your Company’s Digital Fortitude In a world where cyber threats loom large and the digital landscape constantly evolves, protecting your company’s sensitive data and operations has become paramount. As businesses increasingly rely on technology, they are also becoming more susceptible to cyberattacks. This is where CIS-based risk assessments come […]

CIS-Based Risk Assessment

Frequently Asked Questions About Cyber Insurance Readiness Assessments

Frequently Asked Questions About Cyber Insurance Readiness Assessments In an era where digital technology permeates every aspect of our lives, the importance of cybersecurity cannot be overstated. With cyber threats evolving at an alarming pace, organizations must take proactive measures to protect their digital assets and sensitive information. One such measure gaining traction is cyber […]

Cyber Insurance Readiness Assessment

Enhancing Company Security: The Power of NIST-Based Risk Assessments

Enhancing Company Security: The Power of NIST-Based Risk Assessments In an era defined by digital transformation, data breaches and cyberattacks have become increasingly prevalent, posing significant threats to businesses of all sizes. To fortify their defenses and protect sensitive information, companies are turning to comprehensive risk assessments. One such approach gaining traction is the NIST-based […]

NIST-Based Risk Assessment