Cyber Defense Advisors

Cyber Threat Trends

  • by
  • October 18, 2023

The Need for a Cybersecurity-Centric Business Culture

Building a culture of cybersecurity is achievable by acknowledging its importance and consistently reinforcing that message.

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends

ISACA CEO Hails Europe as a Lighthouse of Capability

ISACA’s new CEO highlights growth of its European membership as the Association works on an aggressive growth strategy

Cyber News, Cyber Threat Trends
  • by
  • October 18, 2023

Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign

A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in a two-fold attempt to illicitly mine cryptocurrency and breach cloud environments. Dubbed Qubitstrike by Cado, the intrusion set utilizes Telegram API to exfiltrate cloud service provider credentials following a successful compromise. “The payloads for the Qubitstrike campaign are

Cyber News, Cyber Threat Trends