Cyber Defense Advisors

Cyber Threat Trends

  • by
  • December 14, 2022

Probing Weaponized Chat Applications Abused in Supply-Chain Attacks

This report examines the infection chain and the pieces of malware used by malicious actors in supply-chain attacks that leveraged trojanized installers of chat-based customer engagement platforms.

Cyber News, Cyber Threat Trends
  • by
  • December 14, 2022

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

Apple on Tuesday rolled out security updates to iOS, iPadOS, macOS, tvOS, and Safari web browser to address a new zero-day vulnerability that could result in the execution of malicious code. Tracked as CVE-2022-42856, the issue has been described by the tech giant as a type confusion issue in the WebKit browser engine that could be […]

Cyber News, Cyber Threat Trends
  • by
  • December 14, 2022

Hackers Actively Exploiting Citrix ADC and Gateway Zero-Day Vulnerability

The U.S. National Security Agency (NSA) on Tuesday said a threat actor tracked as APT5 has been actively exploiting a zero-day flaw in Citrix Application Delivery Controller (ADC) and Gateway to take over affected systems. The critical remote code execution vulnerability, identified as CVE-2022-27518, could allow an unauthenticated attacker to execute commands remotely on vulnerable devices and

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends