Cyber Defense Advisors

News

  • by
  • November 28, 2022

Here is why you should have Cobalt Strike detection in place

Google recently released a list of YARA detection rules for malicious variants of the legitimate Cobalt Strike penetration testing framework that are being used by hackers in the wild. Cobalt Strike is a commercial attack framework designed for red teams that has also been adopted by many threat actors, from APT groups to ransomware gangs […]

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks

Over a dozen security flaws have been discovered in baseboard management controller (BMC) firmware from Lanner that could expose operational technology (OT) and internet of things (IoT) networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip (SoC), that’s found in server motherboards and is used for remote monitoring and management of […]

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

Researchers Detail AppSync Cross-Tenant Vulnerability in Amazon Web Services

Amazon Web Services (AWS) has resolved a cross-tenant vulnerability in its platform that could be weaponized by an attacker to gain unauthorized access to resources. The issue relates to a confused deputy problem, a type of privilege escalation where a program that doesn’t have permission to perform an action can coerce a more-privileged entity to perform […]

Cyber News, Cyber Threat Trends

McAfee Personal Data Cleanup: Your Partner in Living a More Private Online Life

Do yourself a favor: Open a new browser tab and head to your search engine of choice. Type in your full name and home address. Then, see what pops up.  Are the results sparking an ember of unease in the back of your brain? Whether you’re a private person online or you’re comfortable sharing your […]

Cyber News, Cyber Threat Trends

Belgian Police Under Fire After Major Ransomware Leak

Crime reports dating back 15 years are made public

Cyber News, Cyber Threat Trends

Top 5 confidential computing uses in healthcare

Big data meets private data in a perfect storm for healthcare. Confidential computing providers say they’ll make the cloud safer for medical data. The post Top 5 confidential computing uses in healthcare appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

African Police Bust $800K Fraud Schemes

International operation lasted four months

Cyber News, Cyber Threat Trends

Russian Sandworm Hackers Linked to New Ransomware Blitz

Ukrainian targets are on the receiving end of RansomBoggs variant

Cyber News, Cyber Threat Trends
  • by
  • November 28, 2022

Elon Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages

Twitter chief executive Elon Musk confirmed plans for end-to-end encryption (E2EE) for direct messages on the platform. The feature is part of Musk’s vision for Twitter 2.0, which is expected to be what’s called an “everything app.” Other functionalities include longform tweets and payments, according to a slide deck shared by Musk over the weekend. The company’s […]

Cyber News, Cyber Threat Trends