Cyber Defense Advisors

News

  • by
  • November 22, 2022

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

As group leader for Cyber Adversary Engagement at MITRE Corp., Maretta Morovitz sees value in getting to know the enemy – she can use knowledge about cyber adversaries to distract, trick, and deflect them and develop strategies to help keep threat actors from getting whatever they’re after. That could mean placing decoys and lures that […]

Cyber News, Cyber Threat Trends

Experts Warn Threat Actors May Abuse Red Team Tool Nighthawk

C2 framework could be the next Cobalt Strike, says Proofpoint

Cyber News, Cyber Threat Trends

Credential Stuffers Steal $300K from DraftKings Customers

Complaints about poor customer service flood Twitter

Cyber News, Cyber Threat Trends
  • by
  • November 22, 2022

What cryptocurrencies and blockchain are good for

It’s all about trust Continue reading on Medium »

Cyber News, Cyber Threat Trends

How to minimize security risks: Follow these best practices for success

To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium. The post How to minimize security risks: Follow these best practices for success appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

Microsoft Defender protects Mac and Linux from malicious websites

Now that attackers can phish employees on any device and try to extract credentials, endpoint protection has to cover more than just Windows. The post Microsoft Defender protects Mac and Linux from malicious websites appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

Google Wins Legal Battle Against Glupteba Botnet

The tech giant said the court’s ruling against the botnet operators set a crucial legal precedent

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Luna Moth callback phishing campaign leverages extortion without malware

Palo Alto’s Unit 42 has investigated several incidents linked to the Luna Moth group callback phishing extortion campaign targeting businesses in multiple sectors, including legal and retail. The analysis discovered that the threat actors behind the campaign leverage extortion without malware-based encryption, have significantly invested in call centers and infrastructure unique to attack targets, and […]

Cyber News, Cyber Threat Trends