Cyber Defense Advisors

Year: 2024

Navigating the Dark Web: Real-world Penetration Testing Scenarios

Navigating the Dark Web: Real-world Penetration Testing Scenarios The internet is like an iceberg. The majority of its content, the vast swathes of information, remains hidden beneath the surface. This hidden realm is often termed the ‘Dark Web’, a clandestine digital realm inaccessible through regular browsers. Although often associated with illicit activities, the Dark Web […]

Penetration Testing

IT Roadmap & Architecture for Sustainable and Green Computing

IT Roadmap & Architecture for Sustainable and Green Computing In the quest for sustainable solutions, the IT sector is uniquely positioned to drive transformations that prioritize our planet. The foundation of this change lies in creating a roadmap for green computing, which not only minimizes environmental damage but also maximizes efficiency and cost savings for […]

Technology Roadmap & Architecture
  • by
  • February 22, 2024

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and the arrest of any individual participating in the operation. “Since January 2020, LockBit actors have executed over 2,000 attacks against victims in the United States, […]

Cyber News
  • by
  • February 22, 2024

Smashing Security podcast #360: LockBit locked out, and funeral Facebook scams

Heaven’s above! Scammers are exploiting online funerals, and LockBit – the “Walmart of Ransomware” – is dismantled in style by cyber cops. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus! Don’t miss our featured interview with Keiron Holyome about […]

Cyber News
  • by
  • February 21, 2024

New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in Android, Linux, and ChromeOS devices that could trick users into joining a malicious clone of a legitimate network or allow an attacker to join a trusted network without a password. The vulnerabilities, tracked as CVE-2023-52160 and CVE-2023-52161, have been discovered following […]

Cyber News
  • by
  • February 21, 2024

Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS

The China-linked threat actor known as Mustang Panda has targeted various Asian countries using a variant of the PlugX (aka Korplug) backdoor dubbed DOPLUGS. “The piece of customized PlugX malware is dissimilar to the general type of the PlugX malware that contains a completed backdoor command module, and that the former is only used for […]

Cyber News
  • by
  • February 21, 2024

Details of a Phone Scam

First-person account of someone who fell for a scam, that started as a fake Amazon service rep and ended with a fake CIA agent, and lost $50,000 cash. And this is not a naive or stupid person. The details are fascinating. And if you think it couldn’t happen to you, think again. Given the right […]

Cyber News
  • by
  • February 21, 2024

6 Ways to Simplify SaaS Identity Governance

With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to identity governance need to happen across a myriad of individual SaaS apps. This presents a huge challenge for centralized IT teams who are ultimately held responsible for managing and securing app access, but can’t possibly […]

Cyber News
  • by
  • February 21, 2024

New ‘VietCredCare’ Stealer Targeting Facebook Advertisers in Vietnam

Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed VietCredCare at least since August 2022. The malware is “notable for its ability to automatically filter out Facebook session cookies and credentials stolen from compromised devices, and assess whether these accounts manage business profiles and if they maintain a positive Meta […]

Cyber News