Cyber Defense Advisors

Cyber News

  • by
  • November 28, 2022

PFSense 6100 Setup Step By Step

PFSense 6100 — Getting Started My initial configuration of a Netgate 6100 and PFSense This is a continuation of posts on Network Security In the last post I showed you how to direct all DNS requests to your preferred DNS servers. Redirect IoT Devices to Preferred DNS As noted that post did not include DNS over HTTPS (DoH) and you would […]

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

The 5 Cornerstones for an Effective Cyber Security Awareness Training

It’s not news that phishing attacks are getting more complex and happening more often. This year alone, APWG reported a record-breaking total of 1,097,811 phishing attacks. These attacks continue to target organizations and individuals to gain their sensitive information.  The hard news: they’re often successful, have a long-lasting negative impact on your organization and employees, including:

Cyber News, Cyber Threat Trends

Top 7 CIAM tools

Customer identity and access management (CIAM), a subset of identity access management (IAM), is used to manage authentication and authorization of account creation and login process for public facing applications. To helps organizations compare their needs against the options in the market, CSO prepared a list with the top seven vendors in the market. To […]

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

Here is why you should have Cobalt Strike detection in place

Google recently released a list of YARA detection rules for malicious variants of the legitimate Cobalt Strike penetration testing framework that are being used by hackers in the wild. Cobalt Strike is a commercial attack framework designed for red teams that has also been adopted by many threat actors, from APT groups to ransomware gangs […]

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

Researchers Detail AppSync Cross-Tenant Vulnerability in Amazon Web Services

Amazon Web Services (AWS) has resolved a cross-tenant vulnerability in its platform that could be weaponized by an attacker to gain unauthorized access to resources. The issue relates to a confused deputy problem, a type of privilege escalation where a program that doesn’t have permission to perform an action can coerce a more-privileged entity to perform […]

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks

Over a dozen security flaws have been discovered in baseboard management controller (BMC) firmware from Lanner that could expose operational technology (OT) and internet of things (IoT) networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip (SoC), that’s found in server motherboards and is used for remote monitoring and management of […]

Cyber News, Cyber Threat Trends

Top 5 confidential computing uses in healthcare

Big data meets private data in a perfect storm for healthcare. Confidential computing providers say they’ll make the cloud safer for medical data. The post Top 5 confidential computing uses in healthcare appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

Belgian Police Under Fire After Major Ransomware Leak

Crime reports dating back 15 years are made public

Cyber News, Cyber Threat Trends

McAfee Personal Data Cleanup: Your Partner in Living a More Private Online Life

Do yourself a favor: Open a new browser tab and head to your search engine of choice. Type in your full name and home address. Then, see what pops up.  Are the results sparking an ember of unease in the back of your brain? Whether you’re a private person online or you’re comfortable sharing your […]

Cyber News, Cyber Threat Trends