Cyber Defense Advisors

News

  • by
  • December 7, 2023

Finally! Facebook and Messenger are getting default end-to-end encryption. And not everyone is happy…

It’s taken a while, but it finally looks like end-to-end encrypted conversations are going to become a reality for users of Facebook and Messenger. In a blog post, Loredana Crisan, Meta’s Head of Messenger, announced that the company has begun to roll out end-to-end encryption (E2EE) for personal chats and calls. The good news?  Meta […]

Cyber News

Why You Shouldn’t Ignore Disaster Recovery Programs

Why You Shouldn’t Ignore Disaster Recovery Programs Imagine having built a stunning sandcastle right by the water’s edge. Hours of effort, meticulous attention to detail, ensuring every tower and turret stands proud. Now, imagine a sudden wave, washing away your creation in seconds. This might seem like a harmless event at the beach, but in […]

Disaster Recovery Program

Why You Shouldn’t Ignore Business Continuity Programs

Why You Shouldn’t Ignore Business Continuity Programs Imagine a major storm hits your city, causing widespread power outages. Or perhaps a cyberattack brings your company’s critical systems to a screeching halt. Situations like these can be detrimental to businesses, especially if there isn’t a well-thought-out plan in place. This is where Business Continuity Programs (BCPs) […]

Business Continuity Program

Why Businesses Think it is Smart to Implement Change Management

Why Businesses Think it is Smart to Implement Change Management Change is an ever-present force in the world of business, driven by evolving markets, technology, and consumer preferences. It’s the ability to adapt and embrace change that often separates thriving businesses from those left in the dust. Enter change management: a strategic approach that companies […]

Change Management
  • by
  • December 7, 2023

Microsoft Warns of COLDRIVER’s Evolving Evasion and Credential-Stealing Tactics

The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while simultaneously improving its detection evasion capabilities. The Microsoft Threat Intelligence team is tracking under the cluster as Star Blizzard (formerly SEABORGIUM). It’s also called Blue Callisto, BlueCharlie (or TAG-53), Calisto (alternately […]

Cyber News
  • by
  • December 7, 2023

Spying through Push Notifications

When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy on them—either for their own reasons or in response to government demands. Sen. Wyden is trying to get to the bottom of this: In a statement, Apple said […]

Cyber News
  • by
  • December 7, 2023

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices and inject keystrokes to achieve code execution as the victim. “Multiple Bluetooth stacks have […]

Cyber News
  • by
  • December 7, 2023

Hacking the Human Mind: Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’

Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of cybersecurity, humans consistently remain primary targets for attackers. Over the years, these attackers have developed their expertise in exploiting various human qualities, sharpening their skills to manipulate biases and emotional triggers with the objective of […]

Cyber News
  • by
  • December 7, 2023

Building a Robust Threat Intelligence with Wazuh

Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It enables organizations to gain a comprehensive insight into historical, present, and anticipated threats, providing context about the constantly evolving threat landscape. Importance of threat intelligence in the cybersecurity ecosystem Threat intelligence is a crucial part […]

Cyber News