Cyber Defense Advisors

Cyber News

FBI and CISA Publish Advisory on Malicious Cyber Activity Against Election Infrastructure

Threat actors trying to compromise elections are unlikely to result in large-scale disruptions

Cyber News

Former Uber CSO found guilty of obstruction in attempted data breach cover-up

Joe Sullivan schemed to hide a 2016 breach of 57 million users’ information shortly after he was hired. The post Former Uber CSO found guilty of obstruction in attempted data breach cover-up appeared first on TechRepublic.

Cyber News

Guilty verdict in the Uber breach case makes personal liability real for CISOs

Yesterday, a federal jury handed down a guilty verdict to Joe Sullivan, the former CSO on charges of “obstruction of the proceedings of the Federal Trade Commission and misprision of felony in connection with the attempted cover-up of a 2016 hack at Uber” according to a notice published by the Department of Justice (DOJ). US […]

Cyber News

Russian Hackers Shut Down US State Government Websites

Russian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.

Cyber News

Phishing attack spoofs Zoom to steal Microsoft user credentials

Targeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox. The post Phishing attack spoofs Zoom to steal Microsoft user credentials appeared first on TechRepublic.

Cyber News

US Consumers Are Finally Becoming More Security & Privacy Conscious

The trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges.

Cyber News

TransUnion taps behavioral analytics to aid fraud detection, curb false positives

Consumers who have used a credit card for a legitimate purchase only to have the sale rejected may be encountering a problem that costs enterprises billions of dollars a year: cybersecurity technology that is designed for fraud detection often ends up generating false positives, incorrectly sending out an alert that a transaction is suspicious. To […]

Cyber News

Network Design: Developer Network

ACM.72 Network architecture for developer access to GitHub and AWS This is a continuation of my series of posts on Automating Cybersecurity Metrics. If you’ve been following along you know that I’ve been setting up components to run batch jobs on AWS, but not only run them — we want to think through how we will securely deploy […]

Cyber News

Top 5 best practices for cloud security

Find out the best practices for securely deploying applications and managing data in the cloud. The post Top 5 best practices for cloud security appeared first on TechRepublic.

Cyber News