Cyber Defense Advisors

Month: March 2024

  • by
  • March 25, 2024

Licensing AI Engineers

The debate over professionalizing software engineers is decades old. (The basic idea is that, like lawyers and architects, there should be some professional licensing requirement for software engineers.) Here’s a law journal article recommending the same idea for AI engineers. This Article proposes another way: professionalizing AI engineering. Require AI engineers to obtain licenses to […]

Cyber News
  • by
  • March 25, 2024

New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data from the CPU cache. […]

Cyber News
  • by
  • March 25, 2024

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning […]

Cyber News
  • by
  • March 24, 2024

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North […]

Cyber News
  • by
  • March 24, 2024

German Police Seize ‘Nemesis Market’ in Major International Darknet Raid

German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said it seized the digital infrastructure associated with the darknet service located in Germany and Lithuania and confiscated €94,000 ($102,107) in cryptocurrency assets. […]

Cyber News

Breaking Down Complex Cloud Networks: The Cloud Technology Analyst Guide

Breaking Down Complex Cloud Networks: The Cloud Technology Analyst Guide Cloud technology has become an indispensable part of the modern digital landscape. From storing data and running applications to powering artificial intelligence and machine learning, the cloud is the backbone of today’s tech-driven world. But behind the seamless experience we enjoy as users lies a […]

Cloud Technology Analyst

Balancing Penetration Testing & Exploitation Assessment in Financial Systems

Balancing Penetration Testing & Exploitation Assessment in Financial Systems The financial sector stands as a fortress guarding vast amounts of sensitive data, making it an attractive target for cybercriminals. As technology advances, so do the methods and tactics used by malicious actors. Financial institutions must employ robust cybersecurity measures to protect their assets and customer […]

Penetration Testing and Exploitation Assessment

Automating Vulnerability Assessment with Machine Learning Algorithms

Automating Vulnerability Assessment with Machine Learning Algorithms In an era where data breaches and cyberattacks are becoming increasingly common, the importance of robust cybersecurity measures cannot be overstated. Organizations of all sizes are constantly at risk of falling victim to malicious actors seeking to exploit vulnerabilities in their digital infrastructure. To stay ahead of these […]

Vulnerability Assessment

AI and High-Level Cybersecurity Risk Assessment Synergy

AI and High-Level Cybersecurity Risk Assessment Synergy In an increasingly interconnected world, the importance of cybersecurity cannot be overstated. As technology continues to advance, so do the methods and tactics of cybercriminals. To combat these evolving threats, organizations are turning to artificial intelligence (AI) to enhance their cybersecurity efforts. This synergy between AI and high-level […]

High-Level Risk Assessment