Cyber Defense Advisors

News

  • by
  • November 7, 2022

How an EIPAssociation in CloudFormation can Help Prevent Dependency Issues

ACM.104 Maintaining a static IP address when you need to delete and recreate an EC2 instance This is a continuation of my series on Automating Cybersecurity Metrics. We ran into a snag in the last post and we’re going to fix it in this post. In that post, we used an AWS-managed prefix list ot add […]

Cyber News, Cyber Threat Trends
  • by
  • November 7, 2022

Experts Find Urlscan Security Scanner Inadvertently Leaks Sensitive URLs and Data

Security researchers are warning of “a trove of sensitive information” leaking through urlscan.io, a website scanner for suspicious and malicious URLs. “Sensitive URLs to shared documents, password reset pages, team invites, payment invoices and more are publicly listed and searchable,” Positive Security co-founder, Fabian Bräunlein, said in a report published on November 2, 2022. The

Cyber News, Cyber Threat Trends

The Conviction of Uber’s Chief Security Officer

I have been meaning to write about Joe Sullivan, Uber’s former Chief Security Officer. He was convicted of crimes related to covering up a cyberattack against Uber. It’s a complicated case, and I’m not convinced that he deserved a guilty ruling or that it’s a good thing for the industry. I may still write something, […]

Cyber News, Cyber Threat Trends
  • by
  • November 7, 2022

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

Organizations that want to prove to others – and to themselves – that they have a solid cybersecurity and data privacy program will undergo a SOC 2 audit. As such, a SOC 2 audit is a big deal, and it’s demanding, and it requires some serious preparation. SOC audits were created by the American Institute […]

Cyber News, Cyber Threat Trends

Japan Joins Key NATO Cyber Agency

Another show of strength for the Cooperative Cyber Defence Centre of Excellence

Cyber News, Cyber Threat Trends

10 Cybersecurity predictions for 2023

As we head into 2023, we look back at the last year and the focus will continue to be on reducing risk exposure and resilience. Organizations are strengthening their ransomware defense, security, and privacy approach to product development, cyberattack response, supply chain risk management and operational technology (OT) security and based on working with customers […]

Cyber News, Cyber Threat Trends

A Guide to Remove Malware From Your iPhone

Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated with a malware infection can range from poor device performance to stolen data.  However, thanks to their closed ecosystem, built-in security features, and strict policies on third-party apps, Apple devices tend to be less prone […]

Cyber News, Cyber Threat Trends

FBI: Beware of Cyber-Threat from Russian Hacktivists

Feds claim DDoS attacks are being aimed at critical infrastructure

Cyber News, Cyber Threat Trends

6 ways to reduce your IoT attack surface

As attackers target the ever-growing IoT attack surface, companies can reduce their risks with these six security best practices. The post 6 ways to reduce your IoT attack surface appeared first on TechRepublic.

Cyber News, Cyber Threat Trends