Cyber Defense Advisors

News

  • by
  • October 23, 2022

Deploy an EC2 Instance with a KMS Encryption Key

ACM.89 Using a KMS customer managed key (CMK) to limit access to data on EC2 Instances and EBS Volumes This is a continuation of my series on Automating Cybersecurity Metrics. Encrypting Volumes when you deploy an EC2 instance is a security best practice on AWS. In fact, you will probably want to enforce this throughout your […]

Cyber News, Cyber Threat Trends
  • by
  • October 22, 2022

Automated Deployment of an EC2 Instance with the Latest AWS Linux AMI

ACM.88 Deploy and instance in the Developer VPC created Earlier and Test Remote Access This is a continuation of my series of posts on Automating Cybersecurity Metrics. We already spent a few posts considering ways to authenticate and log into an EC2 instance and for now, we will use an SSH key. You can follow along […]

Cyber News, Cyber Threat Trends

Biggest Cybersecurity Concerns for Everyone

People on all levels are still making attempts to adopt the new “normal” that COVID-19 presented to the world. It […]

Cyber News, Cyber Threat Trends
  • by
  • October 22, 2022

Critical Flaw Reported in Move Virtual Machine Powering the Aptos Blockchain Network

Researchers have disclosed details about a now-patched critical flaw in the Move virtual machine that powers the Aptos blockchain network. The vulnerability “can cause Aptos nodes to crash and cause denial of service,” Singapore-based Numen Cyber Labs said in a technical write-up published earlier this month. Aptos is a new entrant to the blockchain space, which launched its mainnet on October

Cyber News, Cyber Threat Trends

How to Spot Fake Login Pages 

Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals.   Fake Login Pages Explained   A fake login page is essentially a knock-off of […]

Cyber News, Cyber Threat Trends

TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download

TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

Friday Squid Blogging: The Reproductive Habits of Giant Squid

Interesting: A recent study on giant squid that have washed ashore along the Sea of Japan coast has raised the possibility that the animal has a different reproductive method than many other types of squid. Almost all squid and octopus species are polygamous, with multiple males passing sperm to a single female. Giant squids were […]

Cyber News, Cyber Threat Trends

BlackByte Ransomware Picks Up Where Conti and Sodinokibi Left Off

BlackByte is using Exbyte, a new custom exfiltration tool, to steal data. Learn how to protect your organization from this ransomware. The post BlackByte Ransomware Picks Up Where Conti and Sodinokibi Left Off appeared first on TechRepublic.

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

Emotet Botnet Distributing Self-Unlocking Password-Protected RAR Files to Drop Malware

The notorious Emotet botnet has been linked to a new wave of malspam campaigns that take advantage of password-protected archive files to drop CoinMiner and Quasar RAT on compromised systems. In an attack chain detected by Trustwave SpiderLabs researchers, an invoice-themed ZIP file lure was found to contain a nested self-extracting (SFX) archive, the first archive acting as a […]

Cyber News, Cyber Threat Trends