Cyber Defense Advisors

Year: 2024

  • by
  • July 26, 2024

Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining

Cybersecurity researchers are sounding the alarm over an ongoing campaign that’s leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining. Cloud security firm Wiz is tracking the activity under the name SeleniumGreed. The campaign, which is targeting older versions of Selenium (3.141.59 and prior), is believed to be underway since at least April 2023. “Unbeknownst […]

Cyber News
  • by
  • July 26, 2024

CrowdStrike Warns of New Phishing Scam Targeting German Customers

CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on the Falcon Sensor update fiasco to distribute dubious installers targeting German customers as part of a highly targeted campaign. The cybersecurity company said it identified what it described as an unattributed spear-phishing attempt on July 24, 2024, distributing an inauthentic CrowdStrike Crash Reporter […]

Cyber News
  • by
  • July 26, 2024

Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk

Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw that could result in remote code execution. The vulnerability, tracked as CVE-2024-6327 (CVSS score: 9.9), impacts Report Server version 2024 Q2 (10.1.24.514) and earlier. “In Progress Telerik Report Server versions prior to 2024 Q2 (10.1.24.709), […]

Cyber News
  • by
  • July 25, 2024

The CrowdStrike Outage and Market-Driven Brittleness

Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were canceled. It took down 911 systems and factories, courthouses, and television stations. Tallying the total cost will take time. The outage affected more than 8.5 million Windows computers, and the cost will surely […]

Cyber News
  • by
  • July 25, 2024

Robot dog trained to jam wireless devices during police raids

Graham CLULEY July 25, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial The US Department of Homeland Security has unveiled a dog-like robot that it says has been adapted to jam the connectivity of smart home devices. The DHS’s purchase of “NEO,” developed by Ghost Robotics, was announced to attendees […]

Cyber News

Top Ten Changes Introduced by CMMC Rule 32

Top Ten Changes Introduced by CMMC Rule 32 Ensure Your Compliance & Stay Ahead of the Curve Hold onto your keyboards, folks! The Department of Defense (DoD) is unleashing Rule 32, bringing a whirlwind of updates to the Cybersecurity Maturity Model Certification (CMMC) framework. These changes are set to revolutionize how contractors within the defense […]

Cyber Thoughts
  • by
  • July 25, 2024

SEXi / APT Inc ransomware – what you need to know

SEXi? Seriously? What are you talking about this time? Don’t worry, I’m not trying to conjure images in your mind of Rod Stewart in his iconic leopard print trousers. Instead, I want to warn you about a cybercrime group that has gained notoriety for attacking VMware ESXi servers since February 2024. Excuse me for not […]

Cyber News
  • by
  • July 25, 2024

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps with names such as Andariel, Nickel […]

Cyber News
  • by
  • July 25, 2024

6 Types of Applications Security Testing You Must Know About

Application security testing is a critical component of modern software development, ensuring that applications are robust and resilient against malicious attacks. As cyber threats continue to evolve in complexity and frequency, the need to integrate comprehensive security measures throughout the SDLC has never been more essential. Traditional pentesting provides a crucial snapshot of an application’s […]

Cyber News