Cyber Defense Advisors

Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

Cyber News, Cyber Threat Trends
  • by
  • June 26, 2023

U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware (CVE-2023-20867 and CVE-2023-20887), and one shortcoming impacting Zyxel

Cyber News, Cyber Threat Trends
  • by
  • June 26, 2023

Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam

A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years in prison in the U.S. Joseph James O’Connor (aka PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of New York, a little over a month after he pleaded guilty to the criminal schemes. He was arrested in […]

Cyber News, Cyber Threat Trends