Cyber Defense Advisors

Cyber News

  • by
  • November 9, 2022

APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network

The Russia-linked APT29 nation-state actor has been found leveraging a “lesser-known” Windows feature called Credential Roaming as part of its attack against an unnamed European diplomatic entity. “The diplomatic-centric targeting is consistent with Russian strategic priorities as well as historic APT29 targeting,” Mandiant researcher Thibault Van Geluwe de Berlaere said in a technical write-up.

Cyber News, Cyber Threat Trends
  • by
  • November 9, 2022

Several Cyber Attacks Observed Leveraging IPFS Decentralized Network

A number of phishing campaigns are leveraging the decentralized Interplanetary Filesystem (IPFS) network to host malware, phishing kit infrastructure, and facilitate other attacks. “Multiple malware families are currently being hosted within IPFS and retrieved during the initial stages of malware attacks,” Cisco Talos researcher Edmund Brumaghin said in an analysis shared with The Hacker News.

Cyber News, Cyber Threat Trends
  • by
  • November 9, 2022

Cisco Secure Firewall on AWS: Build resilience at scale with stateful firewall clustering

Organizations embrace the public cloud for the agility, scalability, and reliability it offers when running applications. But just as organizations need these capabilities to ensure their applications operate where needed and as needed, they also require their security does the same. Organizations may introduce multiple individual firewalls into their AWS infrastructure to produce this outcome. […]

Cyber News, Cyber Threat Trends
  • by
  • November 9, 2022

VPC Endpoint for CloudFormation

ACM.106 Adding an Interface VPC Endpoint to A VPC This is a continuation of my series on Automating Cybersecurity Metrics. In the last post I showed how you can provide access to GitHub from AWS with one rule in a security group with an AWS customer-managed prefix list. Creating an AWS Security Group rule to Access GitHub […]

Cyber News, Cyber Threat Trends
  • by
  • November 9, 2022

Unleashing the power of Public Key Cryptography with Non-Fungible Tokens

Proof of Concept with NEAR Protocol Blockchain Continue reading on Medium »

Cyber News, Cyber Threat Trends
  • by
  • November 9, 2022

Why it’s time to review your Microsoft patch management options

You have several options to manage patching on Microsoft networks: let machines independently update or use a third-party patching tool, Windows Software Update Services (WSUS), or another Microsoft management product. If you are still using WSUS as your key patching tool, you may want to review your options. Microsoft is developing additional patching tools that […]

Cyber News, Cyber Threat Trends
  • by
  • November 9, 2022

Rezilion expands SBOM to support Windows environments

Software security platform Rezilion has expanded its Dynamic Software Bill of Materials (SBOM) capability to support Windows environments. The firm said the move will provide organizations with the tools to efficiently manage software vulnerabilities and meet new regulatory standards, addressing functionality gaps of traditional vulnerability management tools primarily designed for use with Linux OS. Features […]

Cyber News, Cyber Threat Trends

Defeating Phishing-Resistant Multifactor Authentication

CISA is now pushing phishing-resistant multifactor authentication. Roger Grimes has an excellent post reminding everyone that “phishing-resistant” is not “phishing proof,” and that everyone needs to stop pretending otherwise. His list of different attacks is particularly useful.

Cyber News, Cyber Threat Trends

Advanced RAT AgentTesla Most Prolific Malware in October

Info-stealers take top three spots, says Check Point

Cyber News, Cyber Threat Trends