Cyber Defense Advisors

News

  • by
  • October 21, 2022

Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies’ Data Leak

Microsoft this week confirmed that it inadvertently exposed information related to thousands of customers following a security lapse that left an endpoint publicly accessible over the internet sans any authentication. “This misconfiguration resulted in the potential for unauthenticated access to some business transaction data corresponding to interactions between Microsoft and prospective

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

A Quick Look at the “Strengthening America’s Cybersecurity” Initiative

Acknowledging that you have a problem is the first step to addressing the problem in a serious way. This seems to be the reasoning for the White House recently announcing its “Strengthening America’s Cybersecurity” initiative. The text of the announcement contains several statements that anyone who’s ever read about cybersecurity will have heard many times […]

Cyber News, Cyber Threat Trends

Lesson Learned: How SolarWinds Strengthened its Security Post-Incident

Tim Brown, CISO and VP of security at SolarWinds shared his experiences remediating a major cyber-attack during Mandiant’s mWISE event on October 18, 2022

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

Hackers Started Exploiting Critical “Text4Shell” Apache Commons Text Vulnerability

WordPress security company Wordfence on Thursday said it started detecting exploitation attempts targeting the newly disclosed flaw in Apache Commons Text on October 18, 2022. The vulnerability, tracked as CVE-2022-42889 aka Text4Shell, has been assigned a severity ranking of 9.8 out of a possible 10.0 on the CVSS scale and affects versions 1.5 through 1.9 of the […]

Cyber News, Cyber Threat Trends

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Machine learning security is extraordinarily difficult because the attacks are so varied—and it seems that each new one is weirder than the next. Here’s the latest: a training-time attack that forces the model to exhibit a point of view: Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.” Abstract: We investigate a new threat to neural […]

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

How can I help protect my company from phishing attacks?

I’m sure you’ve seen them — emails or messages that sound alarming and ask you to act quickly. We live in a digital world that produces hundreds of messages and alerts every day. It’s often hard to determine the validity of a suspicious message or phishing email. Whether you are an administrator, or an end-user, […]

Cyber News, Cyber Threat Trends
  • by
  • October 21, 2022

Ensuring Your CloudFormation Scripts Deploy Properly in Production

ACM.87 How one change can affect other working code, leading to unexpected disaster recovery and deployment failures This is a continuation of my series of posts on Automating Cybersecurity Metrics. I already fixed the error I’m going to write about here in a prior post. I ended up writing this post in the middle of […]

Cyber News, Cyber Threat Trends
  • by
  • October 19, 2022

RESTRICT: LOCKING THE FRONT DOOR (Pt. 3 of “Why Don’t You Go Dox Yourself?”)

In the first step of your doxxing research, we collected a list of our online footprint, digging out the most important accounts that you want to protect and obsolete or forgotten accounts you no longer use. Because the most recent and relevant data is likely to live in the accounts you use regularly, our next […]

Cyber News, Cyber Threat Trends

8 top multi-factor authentication products and how to choose an MFA solution

Today’s credential-based attacks are much more sophisticated. Whether it’s advanced phishing techniques, credential stuffing, or even credentials compromised through social engineering or breaches of a third-party service, credentials are easily the most vulnerable point in defending corporate systems. All these attacks key on traditional credentials, usernames and passwords, which are past their expiration date as […]

Cyber News, Cyber Threat Trends