Cyber Defense Advisors

News

Amazon Customers Receive Smishing Warning After Receiving Fake Texts

Which? said it has reported the fake URLs to the National Cyber Security Centre

Cyber News, Cyber Threat Trends

What is hybrid cloud?

Hybrid cloud has become a popular computing model in recent times. Find out all you need to know, including its features, pros and cons. The post What is hybrid cloud? appeared first on TechRepublic.

Cyber News, Cyber Threat Trends

Fine for Shein! Fashion site hit with $1.9 million bill after lying about data breach

The parent company of women’s fashion site Shein has been fined $1.9 million after being accused of lying about the extent of data breach, and notifying “only a fraction” of affected customers. Read more in my article on the Hot for Security blog.

Cyber News, Cyber Threat Trends

Ransom Cartel Linked to Russia-Based REvil Ransomware Group

The collection became increasingly clear through the tools used by both threat actors

Cyber News, Cyber Threat Trends

Hacking Automobile Keyless Entry Systems

Suspected members of a European car-theft ring have been arrested: The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away. As a result of a coordinated action carried out on 10 October in the three countries involved, 31 suspects were arrested. A total of […]

Cyber News, Cyber Threat Trends

Kolide, endpoint security for teams that want to meet SOC 2 compliance goals without sacrificing privacy

Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! In 2021, our company went through the SOC 2 Type 1 audit, and we found out just how challenging it can be to prove compliance to a third-party auditor. We also learned firsthand […]

Cyber News, Cyber Threat Trends
  • by
  • October 17, 2022

User-Specific Secrets on AWS: Separation of Duties

ACM.83 Leveraging Resource Policies vs IAM Policies to prevent unintended access to secrets in Cloud Environments This is a continuation of my series of posts on Automating Cybersecurity Metrics. Note that I started working on this diagram but I amend it in a later post for greater accuracy and alignment with our policy objectives. In […]

Cyber News, Cyber Threat Trends
  • by
  • October 17, 2022

New Prestige Ransomware Targeting Polish and Ukrainian Organizations

A new ransomware campaign targeted the transportation and logistics sectors in Ukraine and Poland on October 11 with a previously unknown payload dubbed Prestige. “The activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper),” the Microsoft

Cyber News, Cyber Threat Trends
  • by
  • October 17, 2022

Why Crypto Winter is No Excuse to Let Your Cyber Defenses Falter

Don’t let the ongoing “crypto winter” lull you into a false sense of cybersecurity. Even as cryptocurrencies lose value — and some crypto companies file for bankruptcy — cryptojacking still poses an urgent threat to enterprises across industries, from financial services to healthcare to industry 4.0 and beyond.  Broadly speaking, cryptojacking is defined as the unauthorized and illegitimate use

Cyber News, Cyber Threat Trends