Cyber Defense Advisors

Cyber Threat Trends

FTC’s Voice Cloning Challenge

The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.”

Cyber News, Cyber Threat Trends

Half of Ransomware Groups Operating in 2023 Are New

WithSecure report highlights widespread code reuse

Cyber News, Cyber Threat Trends

Stories from the SOC: Proactive steps to protect customers from misconfigured MFA

Executive summary Multifactor authentication, or MFA, provides users with an added layer of security when logging into web applications. Surpassing its predecessor, two-factor authentication, in 2023, MFA is a standard option for another layer of security for online accounts. . In May 2022, the Cybersecurity & Infrastructure Security Agency (CISA) published security advisory AA22-074A describing how […]

Cyber News, Cyber Threat Trends

Smashing Security podcast #348: Hacking for chimp change, and AI chatbot birthday

Who’s more incompetent – the cryptocurrency exchanges or some of the people who hack them? Plus a closer look at the reliability of AI chatbots. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

Cyber News, Cyber Threat Trends
  • by
  • November 16, 2023

Veterans play a crucial role in filling the cybersecurity skills gap

While the veteran unemployment rate may be at a historic low, the transition from the military to civilian life isn’t without its challenges. For starters, ex-military members often need help translating their skills gained in the armed forces to non-military roles, and many need to become more familiar with the wide variety of civilian career path […]

Cyber News, Cyber Threat Trends

New SSH Vulnerability

This is interesting: For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic are vulnerable to complete compromise when naturally occurring computational errors occur while the connection is being established. […] The vulnerability occurs when there are errors during the signature generation that […]

Cyber News, Cyber Threat Trends

How prepared is your company for a supply chain attack?

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In a supply chain attack, hackers aim to breach a target’s defenses by exploiting vulnerabilities in third-party companies. These attacks typically follow one […]

Cyber News, Cyber Threat Trends
  • by
  • November 15, 2023

Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation

Another two bugs in this month’s set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.

Cyber News, Cyber Threat Trends