Cyber Defense Advisors

Year: 2025

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human factor fields such as human-computer interaction (HCI) and psychology, researchers have been concerned that participants mostly come from WEIRD (Western, Educated, Industrialized, Rich, and Democratic) countries. This WEIRD skew may hinder understanding […]

Cyber News

How to Improve Okta Security in Four Steps

Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this prominence has made it a prime target for cybercriminals who seek access to valuable corporate identities, applications, and sensitive data. While Okta provides robust native security features and recommended best practices, maintaining proper security controls requires constant vigilance. Configuration drift, […]

Cyber News

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word […]

Cyber News

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem. This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and […]

Cyber News

Mandatory Coinbase wallet migration? It’s a phishing scam!

An ingenious phishing scam is targeting cryptocurrency investors, by posing as a mandatory wallet migration. Read more in my article on the Hot for Security blog. 

Cyber News

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to “steal information from the target system, such as credentials stored in the browser, digital wallet […]

Cyber News

Beyond Firewalls: The Future of Adaptive Security in Modern Data Centers

Beyond Firewalls: The Future of Adaptive Security in Modern Data Centers Introduction As data centers become the backbone of digital transformation, traditional security models—centered around firewalls and perimeter defenses—are no longer enough. The rise of hybrid cloud environments, AI-driven cyber threats, and remote workforces has made static security measures obsolete. Attackers are now using automated […]

Data Center Cyber Security

Hybrid & Cloud Security: Best Practices for Protecting Multi-Cloud Data Centers

Hybrid & Cloud Security: Best Practices for Protecting Multi-Cloud Data Centers Introduction As businesses scale their operations, many are shifting to hybrid and multi-cloud environments to improve agility, cost efficiency, and performance. Hybrid cloud architectures—which combine on-premise data centers with public and private cloud services (AWS, Azure, Google Cloud, etc.)—have become the foundation of modern […]

Data Center Cyber Security

The Rise of Insider Threats: How Data Centers Can Detect & Prevent Internal Risks

The Rise of Insider Threats: How Data Centers Can Detect & Prevent Internal Risks Introduction Data centers store and manage vast amounts of sensitive corporate, financial, and personal data—making them high-value targets for cybercriminals. While most security strategies focus on external threats like hackers, malware, and ransomware, insider threats pose an equally, if not more, […]

Data Center Cyber Security