Cyber Defense Advisors

Year: 2024

  • by
  • May 9, 2024

Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery

Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the infamous Mirai botnet. That’s according to findings from Juniper Threat Labs, which said the vulnerabilities CVE-2023-46805 and CVE-2024-21887 have been leveraged to deliver the botnet payload. While CVE-2023-46805 is an authentication bypass flaw, CVE-2024-21887 is a command injection […]

Cyber News
  • by
  • May 9, 2024

Cancer patients’ sensitive information accessed by “unidentified parties” after being left exposed by screening lab for years

Graham CLULEY May 09, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial A medical lab that specialises in cancer screenings has admitted to an alarming data breach that left sensitive patient information exposed for years – and accessible by unauthorised parties. California-based Guardant Health is notifying affected individuals that information […]

Cyber News
  • by
  • May 9, 2024

Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws “can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any […]

Cyber News

The Preliminary Assessment: Why the First Step to CMMC Certification is the Most Treacherous

The Preliminary Assessment Why the First Step to CMMC Certification is the Most Treacherous America’s defense network is on red alert! High-profile cyberattacks like SolarWinds and Colonial Pipeline have ripped open massive security flaws, ringing alarm bells across the nation. In a bold move, the Department of Defense (DoD) launched the Cybersecurity Maturity Model Certification […]

Cyber Thoughts
  • by
  • May 8, 2024

Smashing Security podcast #371: Unmasking LockBitsupp, company extortion, and a Tinder fraudster

The kingpin of the LockBit ransomware is named and sanctioned, a cybersecurity consultant is charged with a $1.5 million extortion, and a romance fraudster defrauded women he met on Tinder of £80,000. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and […]

Cyber News
  • by
  • May 8, 2024

A SaaS Security Challenge: Getting Permissions All in One Place 

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each user’s base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with. […]

Cyber News
  • by
  • May 8, 2024

New Spectre-Style ‘Pathfinder’ Attack Targets Intel CPU, Leak Encryption Keys and Data

Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard (AES) algorithm. The techniques have been collectively dubbed Pathfinder by a group of academics from the University of California San Diego, Purdue University, UNC Chapel Hill, Georgia Institute of […]

Cyber News
  • by
  • May 8, 2024

Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of anti-analysis techniques to fly under the radar. “These enhancements aim to increase the malware’s stealthiness, thereby remaining undetected for longer periods of time,” Zscaler ThreatLabz researcher Muhammed Irfan V A said in a technical report. “Hijack Loader […]

Cyber News
  • by
  • May 8, 2024

The Fundamentals of Cloud Security Stress Testing

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them. The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as many as […]

Cyber News