Cyber Defense Advisors

Cyber Threat Trends

9 VOIP security best practices to consider for your business

Is VOIP secure? Can VOIP be hacked? Learn about why VOIP security is important and the best practices for your business to consider with our guide. The post 9 VOIP security best practices to consider for your business appeared first on TechRepublic.

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

How social media scammers buy time to steal your 2FA codes

The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server… but the content is all fake

Cyber News, Cyber Threat Trends

Thousands of Algolia API Keys Could Expose Users’ Data

The majority were from shopping, education, lifestyle, business and medical firms

Cyber News, Cyber Threat Trends

Luna Moth Phishing Extortion Campaign Targets Businesses in Multiple Sectors

It leverages extortion without encryption and has cost victims hundreds of thousands of dollars

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Notorious Emotet Malware Returns With High-Volume Malspam Campaign

The notorious Emotet malware has returned with renewed vigor as part of a high-volume malspam campaign designed to drop payloads like IcedID and Bumblebee. “Hundreds of thousands of emails per day” have been sent since early November 2022, enterprise security company Proofpoint said last week, adding, “the new activity suggests Emotet is returning to its full functionality acting as a […]

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Been Doing It The Same Way For Years? Think Again.

[Want Bob to stop complaining? Change your practices.] [Don’t delay change – it can cost you] [“Always done it that way”? Think again.] [Why you should think again about doing it the old way] [Why you should think again about doing it the same old way] As IT professionals, we all reach a certain point […]

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Customer-Managed KMS Keys vs. AWS Managed Encryption

ACM.118 Why might you choose to use a customer-managed key to protect your cloud resources This is a continuation of my series on Automating Cybersecurity Metrics. Code in the last post automatically stops a VM after deploying it to help save money when resources are created before they are needed for use. https://medium.com/cloud-security/automatically-stop-vms-on-aws-792cded54578 This post provides […]

Cyber News, Cyber Threat Trends

Breaking the Zeppelin Ransomware Encryption Scheme

Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken: The researchers said their break came when they understood that while Zeppelin used three different types of encryption keys to encrypt files, they could undo the whole scheme by factoring or computing just one of them: An ephemeral RSA-512 public key that is […]

Cyber News, Cyber Threat Trends

Private Equity Exposed by Cyber-Hygiene Shortcomings

Fifth of portfolio companies feature “zero tolerance findings”

Cyber News, Cyber Threat Trends