Cyber Defense Advisors

Month: January 2024

IT Infrastructure Transformation in the Age of Sustainable Computing

IT Infrastructure Transformation in the Age of Sustainable Computing In a world where technological advancements are a constant, the IT infrastructure landscape has been evolving at an astonishing pace. From the rise of cloud computing to the proliferation of IoT devices, the demands on IT infrastructure have never been greater. However, with this increased reliance […]

Technology Infrastructure Transformation

IT Carveout, Mergers & Acquisitions: Beyond the Tech Stack

IT Carveout, Mergers & Acquisitions: Beyond the Tech Stack In the ever-evolving landscape of business, mergers and acquisitions (M&A) have become commonplace. They offer companies the opportunity to expand their reach, diversify their portfolios, and capitalize on synergies. While M&A deals are often associated with financial strategies and corporate maneuvering, there’s an often-overlooked aspect that […]

Technology Careveout, Mergers & Acquisitions
  • by
  • January 17, 2024

PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions

The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be weaponized by threat actors to execute arbitrary code. The STM Cyber R&D team, which reverse engineered the Android-based devices manufactured by the Chinese firm owing to their rapid deployment in Poland, said it unearthed half a dozen […]

Cyber News
  • by
  • January 17, 2024

This Free Discovery Tool Finds and Mitigates AI-SaaS Risks

Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands of AI and AI-powered SaaS applications. This will allow companies to better protect their intellectual property (IP) and data against the growing and evolving risks of AI usage. SaaS applications seem to be multiplying by the […]

Cyber News
  • by
  • January 17, 2024

Code Written with AI Assistants Is Less Secure

Interesting research: “Do Users Write More Insecure Code with AI Assistants?“: Abstract: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. Overall, we find that participants who had access to an AI assistant based on OpenAI’s […]

Cyber News
  • by
  • January 17, 2024

Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned that threat actors deploying the AndroxGh0st malware are creating a botnet for “victim identification and exploitation in target networks.” A Python-based malware, AndroxGh0st was first documented by Lacework in December 2022, with the malware inspiring several similar tools like […]

Cyber News
  • by
  • January 17, 2024

Webinar: The Art of Privilege Escalation – How Hackers Become Admins

In the digital age, the battleground for security professionals is not only evolving, it’s expanding at an alarming rate. The upcoming webinar, “The Art of Privilege Escalation – How Hackers Become Admins,” offers an unmissable opportunity for IT security experts to stay ahead in this relentless cyber war. Privilege escalation – the term might sound […]

Cyber News
  • by
  • January 17, 2024

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

Cybersecurity researchers have identified a “lightweight method” called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator. Kaspersky, which analyzed a set of iPhones that were compromised with Pegasus, said the infections left traces in a file named “Shutdown.log,” a text-based […]

Cyber News
  • by
  • January 17, 2024

GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials

GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be potentially exploited to gain access to credentials within a production container. The Microsoft-owned subsidiary said it was made aware of the problem on December 26, 2023, and that it addressed the issue the same day, in addition […]

Cyber News