Cyber Defense Advisors

Month: March 2024

  • by
  • March 15, 2024

Improving C++

C++ guru Herb Sutter writes about how we can improve the programming language for better security. The immediate problem “is” that it’s Too Easy By Default™ to write security and safety vulnerabilities in C++ that would have been caught by stricter enforcement of known rules for type, bounds, initialization, and lifetime language safety. His conclusion: […]

Cyber News
  • by
  • March 15, 2024

Google Introduces Enhanced Real-Time URL Protection for Chrome Users

Google on Thursday announced an enhanced version of Safe Browsing to provide real-time, privacy-preserving URL protection and safeguard users from visiting potentially malicious sites. “The Standard protection mode for Chrome on desktop and iOS will check sites against Google’s server-side list of known bad sites in real-time,” Google’s Jonathan Li and Jasika Bawa said. “If […]

Cyber News
  • by
  • March 15, 2024

Malicious Ads Targeting Chinese Users with Fake Notepad++ and VNote Installers

Chinese users looking for legitimate software such as Notepad++ and VNote on search engines like Baidu are being targeted with malicious ads and bogus links to distribute trojanized versions of the software and ultimately deploy Geacon, a Golang-based implementation of Cobalt Strike. “The malicious site found in the notepad++ search is distributed through an advertisement […]

Cyber News
  • by
  • March 14, 2024

CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms

The data privacy company Onerep.com bills itself as a Virginia-based service for helping people remove their personal information from almost 200 people-search websites. However, an investigation into the history of onerep.com finds this company is operating out of Belarus and Cyprus, and that its founder has launched dozens of people-search services over the years. Onerep’s […]

Cyber News

Risks and Rewards: IT Carveout in Mergers & Acquisitions

Risks and Rewards: IT Carveout in Mergers & Acquisitions Mergers and acquisitions (M&A) evoke images of boardrooms, handshakes, and celebratory toasts. But behind the curtain, the seamless merging or acquiring of companies is a labyrinth of complexities, especially when it comes to Information Technology (IT). The IT carveout, which involves segregating and transferring specific IT […]

Technology Careveout, Mergers & Acquisitions

Revolutionizing Enterprises with IT Infrastructure Transformation

Revolutionizing Enterprises with IT Infrastructure Transformation Bold innovations are reshaping the world, and at the heart of many of these changes is IT infrastructure transformation. Gone are the days when IT was simply about maintaining a handful of servers or troubleshooting occasional computer hiccups. Now, modern enterprises view IT as a strategic enabler, instrumental in […]

Technology Infrastructure Transformation
  • by
  • March 14, 2024

LockBit affiliate jailed for almost four years after guilty plea

An affiliate of the LockBit ransomware gang has been sentenced to almost four years in jail after earlier pleading guilty to charges of cyber extortion and weapons charges. 34-year-old Mikhail Vasiliev, who has dual Russian and Canadian nationality, was arrested in 2022 as part of a multinational law enforcement investigation into LockBit that started in […]

Cyber News
  • by
  • March 14, 2024

LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada

A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his participation in the LockBit global ransomware operation. Mikhail Vasiliev, an Ontario resident, was originally arrested in November 2022 and charged by the U.S. Department of Justice (DoJ) with “conspiring with others to intentionally damage protected computers and to […]

Cyber News
  • by
  • March 14, 2024

Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code execution with elevated privileges under specific circumstances. “The vulnerability allows remote code execution with SYSTEM privileges on all Windows endpoints within a Kubernetes cluster,” Akamai security researcher Tomer Peled said. “To exploit this […]

Cyber News