Cyber Defense Advisors

News

  • by
  • December 7, 2024

Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions

In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a cryptocurrency miner. The versions, 8.3.41 and 8.3.42, have since been removed from the Python Package Index (PyPI) repository. A subsequently released version has introduced a […]

Cyber News
  • by
  • December 7, 2024

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots that limit full visibility. Complex deployment processes. Manual account […]

Cyber News
  • by
  • December 7, 2024

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise of fake business meetings. “The threat actors behind the malware have set up fake companies using AI to make them increase legitimacy,” Cado Security researcher […]

Cyber News
  • by
  • December 7, 2024

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the second round vote, which was scheduled for December 8, 2024, will no longer take place. Călin Georgescu, who won the first round, denounced the verdict […]

Cyber News
  • by
  • December 6, 2024

Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device

Fifteen years ago I blogged about a different SQUID. Here’s an update: Fleeing drivers are a common problem for law enforcement. They just won’t stop unless persuaded­—persuaded by bullets, barriers, spikes, or snares. Each option is risky business. Shooting up a fugitive’s car is one possibility. But what if children or hostages are in it? […]

Cyber News

Report: 65% of Employees Are Breaking Cybersecurity Rules—Opening the Door to Catastrophic Breaches

Report: 65% of Employees Are Breaking Cybersecurity Rules—Opening the Door to Catastrophic Breaches Reused passwords, skipped patches, and shared secrets— how they’re putting your company at risk A new study reveals that two-thirds of employees are ignoring security protocols, turning your cybersecurity into Swiss cheese. A recent survey by CyberArk uncovered a startling reality: 65% […]

Cyber Thoughts
  • by
  • December 6, 2024

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year. The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab. “The spyware placed on his device […]

Cyber News
  • by
  • December 6, 2024

Detecting Pegasus Infections

This tool seems to do a pretty good job. The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine learning to look for anomalies in iOS and Android device activity or telltale signs of spyware infection. For paying iVerify customers, the tool regularly checks devices for potential compromise. But […]

Cyber News
  • by
  • December 6, 2024

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch, and MLeap that could pave the way for code execution. The vulnerabilities, discovered by JFrog, are part of a broader collection of 22 security shortcomings the supply chain security company first disclosed last month. Unlike […]

Cyber News