Cyber Defense Advisors

Month: January 2024

Simplify Your FedRAMP Certification: Streamlining the Path to Compliance

Simplify Your FedRAMP Certification: Streamlining the Path to Compliance Achieving Federal Risk and Authorization Management Program (FedRAMP) certification is a goal for many cloud service providers (CSPs) looking to do business with the U.S. federal government. However, the road to FedRAMP certification can seem daunting, layered with complex requirements and rigorous assessments. This article aims […]

FedRAMP Compliance

How to Become FedRAMP Authorized: A Step-by-Step Guide for Cloud Service Providers

How to Become FedRAMP Authorized: A Step-by-Step Guide for Cloud Service Providers Achieving FedRAMP (Federal Risk and Authorization Management Program) authorization is a significant milestone for any cloud service provider (CSP) aspiring to work with U.S. federal agencies. This authorization not only opens doors to lucrative government contracts but also signals a CSP’s commitment to […]

FedRAMP Compliance

FedRAMP Compliance FAQs: Navigating the Path to Secure Cloud Usage in U.S. Government

FedRAMP Compliance FAQs: Navigating the Path to Secure Cloud Usage in U.S. Government In the realm of U.S. federal information technology, FedRAMP (Federal Risk and Authorization Management Program) stands as a pivotal framework. Its importance in ensuring secure cloud solutions for government agencies cannot be overstated. As such, it’s natural for cloud service providers (CSPs), […]

FedRAMP Compliance
  • by
  • January 9, 2024

Alert: Water Curupira Hackers Actively Distributing PikaBot Loader Malware

A threat actor called Water Curupira has been observed actively distributing the PikaBot loader malware as part of spam campaigns in 2023. “PikaBot’s operators ran phishing campaigns, targeting victims via its two components — a loader and a core module — which enabled unauthorized remote access and allowed the execution of arbitrary commands through an […]

Cyber News
  • by
  • January 9, 2024

Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe

Poorly secured Microsoft SQL (MS SQL) servers are being targeted in the U.S., European Union, and Latin American (LATAM) regions as part of an ongoing financially motivated campaign to gain initial access. “The analyzed threat campaign appears to end in one of two ways, either the selling of ‘access’ to the compromised host, or the […]

Cyber News
  • by
  • January 9, 2024

PIN-Stealing Android Malware

This is an old piece of malware—the Chameleon Android banking Trojan—that now disables biometric authentication in order to steal the PIN: The second notable new feature is the ability to interrupt biometric operations on the device, like fingerprint and face unlock, by using the Accessibility service to force a fallback to PIN or password authentication. […]

Cyber News
  • by
  • January 9, 2024

Midwives clinic takes nine months to deliver news of data breach

Clients of a pregnancy care clinic in Ontario have had their personal information exposed to hackers. I’m sure I don’t need to tell anyone who has made use of the services of a midwife, that a lot can happen in nine months… Read more in my article on the Hot for Security blog. 

Cyber News
  • by
  • January 9, 2024

Why Public Links Expose Your SaaS Attack Surface

Collaboration is a powerful selling point for SaaS applications. Microsoft, Github, Miro, and others promote the collaborative nature of their software applications that allows users to do more. Links to files, repositories, and boards can be shared with anyone, anywhere. This encourages teamwork that helps create stronger campaigns and projects by encouraging collaboration among employees […]

Cyber News
  • by
  • January 9, 2024

Alert: New Vulnerabilities Discovered in QNAP and Kyocera Device Manager

A security flaw has been disclosed in Kyocera’s Device Manager product that could be exploited by bad actors to carry out malicious activities on affected systems. “This vulnerability allows attackers to coerce authentication attempts to their own resources, such as a malicious SMB share, to capture or relay Active Directory hashed credentials if the ‘Restrict […]

Cyber News