Cyber Defense Advisors

News

  • by
  • May 14, 2024

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. “This will help mitigate the misuse of devices designed to help keep track of belongings,” […]

Cyber News

Microsoft Links Executive Fate to Cybersecurity Performance

Microsoft Links Executive Fate to Cybersecurity Performance Could This Be An Ominous New Trendsetter? In a bold move, Microsoft has declared that the paychecks of its top brass will now be tied directly to their cybersecurity performance. This strategic pivot, revealed in a dramatic blog post by executive VP Charlie Bell earlier this month, is […]

Cyber Thoughts
  • by
  • May 13, 2024

Prison for cybersecurity expert selling private videos from inside 400,000 homes

Graham CLULEY May 13, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial A Korean cybersecurity expert has been sentenced to prison for illegally accessing and distributing private videos from vulnerable “wallpad” cameras in 400,000 private households. The 41-year-old man, who has not been officially named, succeeded in remotely accessing 638 […]

Cyber News
  • by
  • May 13, 2024

MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices

The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them,” the non-profit said in […]

Cyber News
  • by
  • May 13, 2024

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture require data […]

Cyber News
  • by
  • May 13, 2024

How Did Authorities Identify the Alleged Lockbit Boss?

Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit’s leader “LockBitSupp” claims the feds named the wrong guy, saying the charges don’t explain how they connected him to Khoroshev. This post examines the […]

Cyber News
  • by
  • May 13, 2024

LLMs’ Data-Control Path Insecurity

Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain Crunch cereal worked to make the right sound. That became his hacker name, and everyone […]

Cyber News
  • by
  • May 13, 2024

SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False […]

Cyber News
  • by
  • May 13, 2024

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. “These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT devices foundational to industrial, healthcare, […]

Cyber News