Cyber Defense Advisors

Year: 2024

  • by
  • March 25, 2024

Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account

In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known as Nobelium). The concerning detail about this case is how easy it was to breach the software giant. It wasn’t a highly technical hack that exploited a zero-day vulnerability – the hackers used a simple […]

Cyber News
  • by
  • March 25, 2024

Ransomware: lessons all companies can learn from the British Library attack

Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS Company Security Compliance Cyber Security Ransomware Disaster Recovery Data Protection 3683 Hits In October 2023, the British Library suffered “one of the worst cyber incidents in British history,” as described by Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC).  […]

Cyber News
  • by
  • March 25, 2024

Licensing AI Engineers

The debate over professionalizing software engineers is decades old. (The basic idea is that, like lawyers and architects, there should be some professional licensing requirement for software engineers.) Here’s a law journal article recommending the same idea for AI engineers. This Article proposes another way: professionalizing AI engineering. Require AI engineers to obtain licenses to […]

Cyber News
  • by
  • March 25, 2024

New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data from the CPU cache. […]

Cyber News
  • by
  • March 25, 2024

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning […]

Cyber News
  • by
  • March 24, 2024

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North […]

Cyber News
  • by
  • March 24, 2024

German Police Seize ‘Nemesis Market’ in Major International Darknet Raid

German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said it seized the digital infrastructure associated with the darknet service located in Germany and Lithuania and confiscated €94,000 ($102,107) in cryptocurrency assets. […]

Cyber News

Breaking Down Complex Cloud Networks: The Cloud Technology Analyst Guide

Breaking Down Complex Cloud Networks: The Cloud Technology Analyst Guide Cloud technology has become an indispensable part of the modern digital landscape. From storing data and running applications to powering artificial intelligence and machine learning, the cloud is the backbone of today’s tech-driven world. But behind the seamless experience we enjoy as users lies a […]

Cloud Technology Analyst

Balancing Penetration Testing & Exploitation Assessment in Financial Systems

Balancing Penetration Testing & Exploitation Assessment in Financial Systems The financial sector stands as a fortress guarding vast amounts of sensitive data, making it an attractive target for cybercriminals. As technology advances, so do the methods and tactics used by malicious actors. Financial institutions must employ robust cybersecurity measures to protect their assets and customer […]

Penetration Testing and Exploitation Assessment