Cyber Defense Advisors

Month: February 2024

  • by
  • February 21, 2024

6 Ways to Simplify SaaS Identity Governance

With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to identity governance need to happen across a myriad of individual SaaS apps. This presents a huge challenge for centralized IT teams who are ultimately held responsible for managing and securing app access, but can’t possibly […]

Cyber News
  • by
  • February 21, 2024

New ‘VietCredCare’ Stealer Targeting Facebook Advertisers in Vietnam

Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed VietCredCare at least since August 2022. The malware is “notable for its ability to automatically filter out Facebook session cookies and credentials stolen from compromised devices, and assess whether these accounts manage business profiles and if they maintain a positive Meta […]

Cyber News
  • by
  • February 21, 2024

Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery

On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were failing. Ambulances were diverted. Care was impaired. Hospitals in three states were hit by a ransomware attack, and in that moment, the real-world repercussions came to light—it wasn’t just computer networks that were brought to […]

Cyber News
  • by
  • February 21, 2024

Signal Introduces Usernames, Allowing Users to Keep Their Phone Numbers Private

End-to-end encrypted (E2EE) messaging app Signal said it’s piloting a new feature that allows users to create unique usernames (not to be confused with profile names) and keep the phone numbers away from prying eyes. “If you use Signal, your phone number will no longer be visible to everyone you chat with by default,” Signal’s […]

Cyber News
  • by
  • February 21, 2024

Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks

Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam emails to propagate war-related disinformation. The activity has been linked to Russia-aligned threat actors by Slovak cybersecurity company ESET, which also identified a spear-phishing campaign aimed at a Ukrainian defense company in October 2023 and a European Union agency in November 2023 […]

Cyber News
  • by
  • February 21, 2024

VMware Alert: Uninstall EAP Now – Critical Flaw Puts Active Directory at Risk

VMware is urging users to uninstall the deprecated Enhanced Authentication Plugin (EAP) following the discovery of a critical security flaw. Tracked as CVE-2024-22245 (CVSS score: 9.6), the vulnerability has been described as an arbitrary authentication relay bug. “A malicious actor could trick a target domain user with EAP installed in their web browser into requesting […]

Cyber News
  • by
  • February 20, 2024

Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates

U.S. and U.K. authorities have seized the darknet websites run by LockBit, a prolific and destructive ransomware group that has claimed more than 2,000 victims worldwide and extorted over $120 million in payments. Instead of listing data stolen from ransomware victims who didn’t pay, LockBit’s victim shaming website now offers free recovery tools, as well […]

Cyber News

Infrastructure Consulting for Hyperconnected Urban Centers

Infrastructure Consulting for Hyperconnected Urban Centers Imagine a city where traffic flows seamlessly, public services are hyper-responsive, and digital connections are the lifeblood of every urban function. This isn’t just a scene from a futuristic movie, but a reality that many urban centers are steadily approaching. With the advent of smart technologies and the Internet […]

Technology Infrastructure Transformation

Incident Response Mechanics in Large-scale IoT Invasions

Incident Response Mechanics in Large-scale IoT Invasions Imagine walking into your living room and finding your smart refrigerator conspiring with your Wi-Fi enabled thermostat, plotting their next move in a cyber war. It sounds like something out of a sci-fi thriller, but in the realm of the Internet of Things (IoT), such scenarios—though dramatized here—are […]

Incident Response Testing