Cyber Defense Advisors

News

Proud to be 5! Thank you for being with us! What a journey it has been

We began in 2017 as a small business aiming to make a difference in the cybersecurity and cryptography industry…. The post Proud to be 5! Thank you for being with us! What a journey it has been appeared first on JISA Softech Pvt Ltd.

Cyber News

Fortinet Warns of Active Exploitation of Newly Discovered Critical Auth Bypass Bug

Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and proxy products is being actively exploited in the wild. Tracked as CVE-2022-40684 (CVSS score: 9.6), the flaw relates to an authentication bypass in FortiOS, FortiProxy, and FortiSwitchManager that could allow a remote attacker to perform unauthorized operations on the administrative

Cyber News

Mystery iPhone update patches against iOS 16 mail crash-attack

The problem with crashy messaging apps is that *other people* get to choose if and when to send you messages…

Cyber News

Emotet Rises Again With More Sophistication, Evasion

An analysis of the malware and its infection strategies finds nearly 21,000 minor and 139 major variations on the malware — complexity that helps it dodge analysis.

Cyber News

US Airports in Cyberattack Crosshairs for Pro-Russian Group Killnet

Killnet calls on other groups to launch similar attacks against US civilian infrastructure, including marine terminals and logistics facilities, weather monitoring centers, and healthcare systems.

Cyber News

Zimbra RCE Bug Under Active Attack

A flaw in unpatched Zimbra email servers could allow attackers to obtain remote code execution by pushing malicious files past filters.

Cyber News

Ukraine Enhances Cooperation With EU Cybersecurity Agencies

Ukraine looks to enhance European integration with ENISA special partner status

Cyber News

Endor Labs offers dependency management platform for open source software

Endor Labs came out of stealth on Monday and launched its Dependency Lifecycle Management Platform, designed to ensure end-to-end security for open source software (OSS). The software addresses three key things—helping engineers select better dependencies, helping organizations optimize their engineering, and helping them reduce vulnerability noise. The platform scans the source code and offers feedback […]

Cyber News

Intel Confirms Source Code Leak

Cyber-criminals could use the leaked source code to help launch attacks

Cyber News