Cyber Defense Advisors

Cyber Threat Trends

Metaparasites: The cybercriminals who rip each other off

Researchers at Sophos have investigated so-called “metaparasites” – the scammers who scam other scammers.

Cyber News, Cyber Threat Trends

#BHEU: Time for Cyber Pros to Shape the Industry’s Future

Jen Ellis urges the cyber industry to take a leading role in shaping its future, during Black Hat Europe 2022

Cyber News, Cyber Threat Trends

Leaked Signing Keys Are Being Used to Sign Malware

A bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware. […]

Cyber News, Cyber Threat Trends
  • by
  • December 8, 2022

Explorations in the spam folder–Holiday Edition

Watch ThreatWise TV: Explorations in the spam folder The spam folder: that dark and disregarded corner of every email account, full of too-good-to-be-true offers, unexpected shipments, and supposedly free giveaways. You’re right to ignore this folder; few good things come from exploring it. But every once in a while one of these misleading, and sometimes […]

Cyber News, Cyber Threat Trends

Leaked Signing Keys Are Being Used to Sign Malware

A bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware. […]

Cyber News, Cyber Threat Trends

What is YTQ?

What is CRQC? Widespread interest in quantum computing continues to expand as computer innovators, scientists, and technology industry leaders vie to position themselves at the top of the pack for quantum computing prowess.  As the buzz continues, I’d like to discuss Cryptographically Relevant Quantum Computers (CRQC) in simple terms. A CRQC uses quantum mechanical phenomena […]

Cyber News, Cyber Threat Trends

Pet Dog Unmasks Drug Trafficker on Encrypted Chat

Police studied photos sent via EncroChat to reveal users

Cyber News, Cyber Threat Trends

Pet Dog Unmasks Drug Trafficker on Encrypted Chat

Police studied photos sent via EncroChat to reveal users

Cyber News, Cyber Threat Trends

Microsoft Warns Cryptocurrency Firms Against Complex Cyber-Attacks

Attacks included fraud, vulnerability exploitation, fake applications and info stealer deployments

Cyber News, Cyber Threat Trends