Cyber Defense Advisors

Year: 2024

  • by
  • March 16, 2024

Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer

Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with 11 different accounts, according to G DATA. The repositories in question have since been taken down by the Microsoft-owned subsidiary. “The repositories look similar, […]

Cyber News
  • by
  • March 15, 2024

Friday Squid Blogging: Operation Squid

Operation Squid found 1.3 tons of cocaine hidden in frozen fish. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: drug trade, squid Sidebar photo of Bruce Schneier by Joe MacInnis.  

Cyber News
  • by
  • March 15, 2024

GhostRace – New Data Leak Vulnerability Affects Modern CPUs

A group of researchers has discovered a new data leakage attack impacting modern CPU architectures supporting speculative execution. Dubbed GhostRace (CVE-2024-2193), it is a variation of the transient execution CPU vulnerability known as Spectre v1 (CVE-2017-5753). The approach combines speculative execution and race conditions. “All the common synchronization primitives implemented using conditional branches can be […]

Cyber News

AI-Driven Insights for High-Level Cybersecurity Risk Assessments

AI-Driven Insights for High-Level Cybersecurity Risk Assessments The world of cybersecurity is dynamic and ever-evolving. As organizations seek to defend their systems and data against an array of threats, they are increasingly turning to artificial intelligence (AI) for innovative solutions. AI-driven insights are now central to conducting high-level cybersecurity risk assessments, offering unparalleled speed, accuracy, […]

High-Level Risk Assessment

Advanced Web Application Testing for Progressive Web Apps

Advanced Web Application Testing for Progressive Web Apps Progressive Web Apps (PWAs) represent the sweet spot between traditional websites and native mobile applications. They’ve grown in popularity due to their ability to offer seamless user experiences on the web that rival native apps. Yet, with the added complexity of their architecture, comes the critical need […]

Web Application Testing

Gauging the ROI of a Cyber Insurance Readiness Assessment

Gauging the ROI of a Cyber Insurance Readiness Assessment The landscape of cybersecurity has never been more intricate. With new threats emerging daily and data breaches frequently making headlines, businesses big and small are grappling with how to protect themselves. One tool that has risen to prominence in this domain is the Cyber Insurance Readiness […]

Cyber Insurance Readiness Assessment
  • by
  • March 15, 2024

Scareware scam: Restoro and Reimage fined $26 million by FTC

Graham CLULEY March 15, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial Two firms have been fined $26 million by the US Federal Trade Commission (FTC) for scaring consumers into believing their computers were infected by malware. The FTC claimed that Restoro Cyprus Limited and Reimage Cyprus Limited, both based […]

Cyber News

Weighing Ethical Boundaries: Penetration Testing & Exploitation Assessment

Weighing Ethical Boundaries: Penetration Testing & Exploitation Assessment A security fortress is only as good as its weakest link. For years, the cybersecurity world has been hard at work, fortifying digital walls against hackers. But how can we be certain these walls are impenetrable? Enter penetration testing and exploitation assessment: practices that put these defenses […]

Penetration Testing and Exploitation Assessment

SOC 2 Compliance in Decentralized Cloud Environments

SOC 2 Compliance in Decentralized Cloud Environments The cloud landscape is rapidly changing. Traditional centralized cloud services like AWS, Google Cloud, and Azure are facing a new contender: decentralized cloud platforms. As the future of computing moves towards decentralization, businesses and tech aficionados are left to grapple with a pressing concern: how do we maintain […]

SOC 2 Compliance