Cyber Defense Advisors

Cyber News

TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download

TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

BlackByte Ransomware Picks Up Where Conti and Sodinokibi Left Off

BlackByte is using Exbyte, a new custom exfiltration tool, to steal data. Learn how to protect your organization from this ransomware. The post BlackByte Ransomware Picks Up Where Conti and Sodinokibi Left Off appeared first on TechRepublic.

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

Emotet Botnet Distributing Self-Unlocking Password-Protected RAR Files to Drop Malware

The notorious Emotet botnet has been linked to a new wave of malspam campaigns that take advantage of password-protected archive files to drop CoinMiner and Quasar RAT on compromised systems. In an attack chain detected by Trustwave SpiderLabs researchers, an invoice-themed ZIP file lure was found to contain a nested self-extracting (SFX) archive, the first archive acting as a […]

Cyber News, Cyber Threat Trends

Top 3 tips to identify quality vulnerability intelligence

Vulnerability intelligence tools can be very useful to prioritize the key threats security professionals need to take action on for their organization, but it’s important to remember that some are better than others. The post Top 3 tips to identify quality vulnerability intelligence appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

New Phishing Campaign Targets Saudi Government Service Portal

The campaigns are set up to provide fake services to the citizens and steal their credentials

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

When cops hack back: Dutch police fleece DEADBOLT criminals (legally!)

Crooks: Show us the money! Cops: How about you show us the decryption keys first?

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and Ransomware

A now-patched vulnerability in VMware Workspace ONE Access has been observed being exploited to deliver both cryptocurrency miners and ransomware on affected machines. “The attacker intends to utilize a victim’s resources as much as possible, not only to install RAR1Ransom for extortion, but also to spread GuardMiner to collect cryptocurrency,” Fortinet FortiGuard Labs researcher Cara […]

Cyber News, Cyber Threat Trends

Google Unveils Open Source Project to Improve Software Supply Chain Security

GUAC aims to bring together many different sources of software security metadata

Cyber News, Cyber Threat Trends

NCSC CEO Calls for International Standards on IoT Security

Lindy Cameron argues that smart cities are becoming an attractive target for threat actors, including nation states

Cyber News, Cyber Threat Trends