Cyber Defense Advisors

Year: 2024

Revolutionizing High-Level Cybersecurity Risk Assessment with AI

Revolutionizing High-Level Cybersecurity Risk Assessment with AI The fusion of artificial intelligence (AI) with cybersecurity is akin to putting on a pair of infrared goggles in a dark room. Suddenly, risks that once lurked unseen in the shadows become glaringly apparent, offering organizations the opportunity to bolster their defenses and outmaneuver digital adversaries. The Changing […]

High-Level Risk Assessment
  • by
  • March 8, 2024

Secrets Sensei: Conquering Secrets Management Challenges

In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We’re all familiar with the routine: safeguarding those API keys, connection strings, and certificates is non-negotiable. However, let’s dispense with the pleasantries; this isn’t a simple ‘set it and […]

Cyber News
  • by
  • March 8, 2024

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user. The networking equipment company described the vulnerability, tracked as CVE-2024-20337 (CVSS score: 8.2), as allowing an unauthenticated, remote attacker to conduct […]

Cyber News
  • by
  • March 8, 2024

QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed “large company” to connect to their infrastructure. While a number of legitimate tunneling tools like Chisel, FRP, ligolo, ngrok, and Plink have been used by adversaries to their advantage, the development marks the first […]

Cyber News
  • by
  • March 8, 2024

CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-27198 (CVSS score: 9.8), refers to an authentication bypass bug that allows for a complete compromise of a […]

Cyber News
  • by
  • March 7, 2024

$12.5 billion lost to cybercrime, amid tidal wave of crypto investment fraud

If you have been optimistically daydreaming that losses attributed to cybercrime might have reduced in the last year, it’s time to wake up. The FBI’s latest annual Internet Crime Complaint Center (IC3) report has just been published and makes for some grim reading. According to the IC3 report, online fraud hit record losses in 2023, […]

Cyber News
  • by
  • March 7, 2024

Emergency. Ransomware halts beer production at Belgium’s Duvel brewery

Ransomware HALTS beer production at Belgium’s Duvel brewery | Graham Cluley Watch this video on YouTube Bad news folks. I’m afraid that the people of Belgium are dealing with a national emergency. Yes, I’m afraid that a ransomware attack hit a part of Belgium’s critical infrastructure on Tuesday night. Sign up to our free newsletter.Security […]

Cyber News
  • by
  • March 7, 2024

Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form of distributed brute-force attacks, “target WordPress websites from the browsers of completely innocent and unsuspecting site visitors,” security researcher Denis Sinegubko said. The activity is part of a previously documented […]

Cyber News
  • by
  • March 7, 2024

Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks

The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end goal of the attacks is to deliver malicious downloaders for Windows and macOS that deploy a known backdoor called MgBot and a previously undocumented Windows implant known as Nightdoor. […]

Cyber News