Cyber Defense Advisors

News

  • by
  • November 12, 2024

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more accurate, efficient, […]

Cyber News
  • by
  • November 12, 2024

Winter Fuel Payment scam targets UK citizens via SMS

Scammers have leapt at the opportunity to exploit vulnerable UK residents by sending bogus messages telling them they need to take action to receive help with their winter heating bills.  In July, the UK’s new Labour Government announced that it was limiting who was eligible for assistance with their winter fuel bills by making eligibility […]

Cyber News
  • by
  • November 12, 2024

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. “Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness,” Russian cybersecurity vendor Kaspersky said. “Threat actors leveraged an unconventional blend of […]

Cyber News

Get Ready: Our CMMC 2.0 Rule 32 Handbook Is Here!

Get Ready: Our CMMC 2.0 Rule 32 Handbook Is Here! Find Out What’s New, What’s Changed, And How to Ensure Compliance Hey there, defense contractors and everyone impacted by CMMC changes! Big news: We’ve just released a brand-new CMMC 2.0 Rule 32 Handbook, your go-to guide for navigating the latest compliance standards. Check it out […]

Cyber Thoughts
  • by
  • November 11, 2024

200,000 SelectBlinds customers have their card details skimmed in malware attack

Graham CLULEY November 11, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial SelectBlinds, a popular online retailer of blinds and shades, has disclosed a security breach that has impacted 206,238 of its customers. Hackers successfully managed to embed malware onto the company’s website, capable of stealing sensitive information, including credit […]

Cyber News
  • by
  • November 11, 2024

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using […]

Cyber News
  • by
  • November 11, 2024

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. “In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: ‘Are Bengal Cats legal in Australia?,’” […]

Cyber News
  • by
  • November 11, 2024

The ROI of Security Investments: How Cybersecurity Leaders Prove It

Cyber threats are intensifying, and cybersecurity has become critical to business operations. As security budgets grow, CEOs and boardrooms are demanding concrete evidence that cybersecurity initiatives deliver value beyond regulation compliance. Just like you wouldn’t buy a car without knowing it was first put through a crash test, security systems must also be validated to […]

Cyber News
  • by
  • November 11, 2024

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week. The server-side weaknesses “allow attackers to hijack important servers in the organization such as […]

Cyber News