Cyber Defense Advisors

News

  • by
  • May 9, 2024

How Criminals Are Using Generative AI

There’s a new report on how criminals are using generative AI tools: Key Takeaways: Adoption rates of AI technologies among criminals lag behind the rates of their industry counterparts because of the evolving nature of cybercrime. Compared to last year, criminals seem to have abandoned any attempt at training real criminal large language models (LLMs). […]

Cyber News
  • by
  • May 9, 2024

FBI warns US retailers that hackers are targeting their gift card systems

The FBI has issued a warning to US retailers about a financially-motivated malicious hacking ring that has been targeting employees with phishing attacks in an attempt to create fraudulent gift cards. Staff at the corporate offices of US retail companies have been the target of highly-sophisticated email phishing and SMS phishing (“smishing”) attacks. These attacks […]

Cyber News
  • by
  • May 9, 2024

Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign

Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. “The campaign sent emails with content intended to arouse the recipient’s interest and persuade him to click on the link,” the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on […]

Cyber News
  • by
  • May 9, 2024

New Guide: How to Scale Your vCISO Services Profitably

Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to hire a full-time CISO. A vCISO can answer this need by offering on-demand access to top-tier cybersecurity expertise. This is also an opportunity for MSPs and MSSPs to grow their business and bottom line. MSPs and MSSPs that […]

Cyber News
  • by
  • May 9, 2024

Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery

Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the infamous Mirai botnet. That’s according to findings from Juniper Threat Labs, which said the vulnerabilities CVE-2023-46805 and CVE-2024-21887 have been leveraged to deliver the botnet payload. While CVE-2023-46805 is an authentication bypass flaw, CVE-2024-21887 is a command injection […]

Cyber News
  • by
  • May 9, 2024

Cancer patients’ sensitive information accessed by “unidentified parties” after being left exposed by screening lab for years

Graham CLULEY May 09, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial A medical lab that specialises in cancer screenings has admitted to an alarming data breach that left sensitive patient information exposed for years – and accessible by unauthorised parties. California-based Guardant Health is notifying affected individuals that information […]

Cyber News
  • by
  • May 9, 2024

Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws “can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any […]

Cyber News

The Preliminary Assessment: Why the First Step to CMMC Certification is the Most Treacherous

The Preliminary Assessment Why the First Step to CMMC Certification is the Most Treacherous America’s defense network is on red alert! High-profile cyberattacks like SolarWinds and Colonial Pipeline have ripped open massive security flaws, ringing alarm bells across the nation. In a bold move, the Department of Defense (DoD) launched the Cybersecurity Maturity Model Certification […]

Cyber Thoughts
  • by
  • May 8, 2024

Smashing Security podcast #371: Unmasking LockBitsupp, company extortion, and a Tinder fraudster

The kingpin of the LockBit ransomware is named and sanctioned, a cybersecurity consultant is charged with a $1.5 million extortion, and a romance fraudster defrauded women he met on Tinder of £80,000. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and […]

Cyber News