Cyber Defense Advisors

Cyber News

  • by
  • November 22, 2022

U.S. Authorities Seize Domains Used in ‘Pig butchering’ Cryptocurrency Scams

The U.S. Justice Department (DoJ) on Monday announced the takedown of seven domain names in connection to a “pig butchering” cryptocurrency scam. The fraudulent scheme, which operated from May to August 2022, netted the actors over $10 million from five victims, the DoJ said. Pig butchering, also called Sha Zhu Pan, is a type of scam in […]

Cyber News, Cyber Threat Trends
  • by
  • November 22, 2022

Luna Moth Gang Invests in Call Centers to Target Businesses with Callback Phishing Campaigns

The Luna Moth campaign has extorted hundreds of thousands of dollars from several victims in the legal and retail sectors. The attacks are notable for employing a technique called callback phishing or telephone-oriented attack delivery (TOAD), wherein the victims are social engineered into making a phone call through phishing emails containing invoices and subscription-themed lures. Palo Alto

Cyber News, Cyber Threat Trends
  • by
  • November 22, 2022

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

As group leader for Cyber Adversary Engagement at MITRE Corp., Maretta Morovitz sees value in getting to know the enemy – she can use knowledge about cyber adversaries to distract, trick, and deflect them and develop strategies to help keep threat actors from getting whatever they’re after. That could mean placing decoys and lures that […]

Cyber News, Cyber Threat Trends

Experts Warn Threat Actors May Abuse Red Team Tool Nighthawk

C2 framework could be the next Cobalt Strike, says Proofpoint

Cyber News, Cyber Threat Trends

Credential Stuffers Steal $300K from DraftKings Customers

Complaints about poor customer service flood Twitter

Cyber News, Cyber Threat Trends
  • by
  • November 22, 2022

What cryptocurrencies and blockchain are good for

It’s all about trust Continue reading on Medium »

Cyber News, Cyber Threat Trends

How to minimize security risks: Follow these best practices for success

To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium. The post How to minimize security risks: Follow these best practices for success appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

Microsoft Defender protects Mac and Linux from malicious websites

Now that attackers can phish employees on any device and try to extract credentials, endpoint protection has to cover more than just Windows. The post Microsoft Defender protects Mac and Linux from malicious websites appeared first on TechRepublic.

Cyber News, Cyber Threat Trends