Cyber Defense Advisors

News

Why You Shouldn’t Ignore SEC Compliance

Why You Shouldn’t Ignore SEC Compliance Financial markets can be likened to a vast and intricate dance, with many participants moving to the beat of various regulations and guidelines. At the center of this rhythm in the United States is the Securities and Exchange Commission (SEC). Founded after the stock market crash of 1929, the […]

SEC Compliance

Simplify Your NIST-Based Risk Assessments

Simplify Your NIST-Based Risk Assessments In an era where information and data have become the lifeblood of businesses and organizations, the importance of safeguarding this invaluable resource cannot be overstated. Cybersecurity threats lurk in the shadows, waiting to exploit vulnerabilities and wreak havoc. To protect against these threats, it’s crucial to have a systematic approach […]

NIST-Based Risk Assessment
  • by
  • November 23, 2023

Hackers pose as officials to steal secrets and cryptocurrency for North Korea

A hacking gang has been accused of impersonating South Korean officials and journalists in a plot to steal cryptocurrency for the North Korean regime. According to local media reports, South Korea’s police agency has confirmed that between March and October 2023 a total of 1,468 people fell victim to the campaign which attempted to install […]

Cyber News

Simplify Your M&A Technology Due Diligence

Simplify Your M&A Technology Due Diligence In the fast-paced world of mergers and acquisitions (M&A), technology plays a pivotal role. The integration of new technologies can drive efficiency, enhance competitiveness, and open new revenue streams. However, navigating the complex landscape of technology due diligence during an M&A can be a daunting task. In this article, […]

M&A IT Due Diligence

Simplify Your High-Level Risk Assessments

Simplify Your High-Level Risk Assessments Navigating the treacherous waters of risk assessment can be daunting for many organizations. But fear not, for the art of risk assessment can be distilled into actionable, understandable steps, irrespective of how convoluted the initial scenario may appear. In a world where risks evolve continuously, understanding how to break them […]

High-Level Risk Assessment
  • by
  • November 23, 2023

N. Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed by a Taiwanese multimedia software developer called CyberLink to target downstream customers via a supply chain attack. “This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that […]

Cyber News
  • by
  • November 22, 2023

New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login

A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X laptops. The flaws were discovered by researchers at hardware and software product security and offensive research firm Blackwing Intelligence, who found the weaknesses in the fingerprint sensors […]

Cyber News
  • by
  • November 22, 2023

North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns

North Korean threat actors have been linked to two campaigns in which they masquerade as both job recruiters and seekers to distribute malware and obtain unauthorized employment with organizations based in the U.S. and other parts of the world. The activity clusters have been codenamed Contagious Interview and Wagemole, respectively, by Palo Alto Networks Unit […]

Cyber News
  • by
  • November 22, 2023

Apple to Add Manual Authentication to iMessage

Signal has had the ability to manually authenticate another account for years. iMessage is getting it: The feature is called Contact Key Verification, and it does just what its name says: it lets you add a manual verification step in an iMessage conversation to confirm that the other person is who their device says they […]

Cyber News