Cyber Defense Advisors

News

Risks and Rewards: IT Carveout in Mergers & Acquisitions

Risks and Rewards: IT Carveout in Mergers & Acquisitions Mergers and acquisitions (M&A) evoke images of boardrooms, handshakes, and celebratory toasts. But behind the curtain, the seamless merging or acquiring of companies is a labyrinth of complexities, especially when it comes to Information Technology (IT). The IT carveout, which involves segregating and transferring specific IT […]

Technology Careveout, Mergers & Acquisitions

Revolutionizing Enterprises with IT Infrastructure Transformation

Revolutionizing Enterprises with IT Infrastructure Transformation Bold innovations are reshaping the world, and at the heart of many of these changes is IT infrastructure transformation. Gone are the days when IT was simply about maintaining a handful of servers or troubleshooting occasional computer hiccups. Now, modern enterprises view IT as a strategic enabler, instrumental in […]

Technology Infrastructure Transformation
  • by
  • March 14, 2024

LockBit affiliate jailed for almost four years after guilty plea

An affiliate of the LockBit ransomware gang has been sentenced to almost four years in jail after earlier pleading guilty to charges of cyber extortion and weapons charges. 34-year-old Mikhail Vasiliev, who has dual Russian and Canadian nationality, was arrested in 2022 as part of a multinational law enforcement investigation into LockBit that started in […]

Cyber News
  • by
  • March 14, 2024

LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada

A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his participation in the LockBit global ransomware operation. Mikhail Vasiliev, an Ontario resident, was originally arrested in November 2022 and charged by the U.S. Department of Justice (DoJ) with “conspiring with others to intentionally damage protected computers and to […]

Cyber News
  • by
  • March 14, 2024

Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code execution with elevated privileges under specific circumstances. “The vulnerability allows remote code execution with SYSTEM privileges on all Windows endpoints within a Kubernetes cluster,” Akamai security researcher Tomer Peled said. “To exploit this […]

Cyber News
  • by
  • March 14, 2024

Automakers Are Sharing Driver Data with Insurers without Consent

Kasmir Hill has the story: Modern cars are internet-enabled, allowing access to services like navigation, roadside assistance and car apps that drivers can connect to their vehicles to locate them or unlock them remotely. In recent years, automakers, including G.M., Honda, Kia and Hyundai, have started offering optional features in their connected-car apps that rate […]

Cyber News
  • by
  • March 14, 2024

3 Things CISOs Achieve with Cato

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs around the globe use Cato SSE 360, as part of the Cato SASE Cloud platform to balance these factors without compromise. This article details how […]

Cyber News
  • by
  • March 14, 2024

RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage

The Russian-speaking cybercrime group called RedCurl is leveraging a legitimate Microsoft Windows component called the Program Compatibility Assistant (PCA) to execute malicious commands. “The Program Compatibility Assistant Service (pcalua.exe) is a Windows service designed to identify and address compatibility issues with older programs,” Trend Micro said in an analysis published this month. “Adversaries can exploit […]

Cyber News
  • by
  • March 14, 2024

Ande Loader Malware Targets Manufacturing Sector in North America

The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader to deliver remote access trojans (RATs) like Remcos RAT and NjRAT. The attacks, which take the form of phishing emails, targeted Spanish-speaking users in the manufacturing industry based in North America, eSentire said. Blind Eagle (aka APT-C-36) is […]

Cyber News