Cyber Defense Advisors

News

Ransomware Gang Files SEC Complaint

A ransomware gang, annoyed at not being paid, filed an SEC complaint against its victim for not disclosing its security breach within the required four days. This is over the top, but is just another example of the extreme pressure ransomware gangs put on companies after seizing their data. Gangs are now going through the […]

Cyber News

Frequently Asked Questions on Technology Infrastructure Transformation

Frequently Asked Questions on Technology Infrastructure Transformation Technology infrastructure transformation is a term that has become increasingly popular in the last few years. It refers to the process of modernizing and transforming a company’s existing IT infrastructure to make it more agile, scalable, and suited for the digital age. This could mean moving to the […]

Technology Infrastructure Transformation

Frequently Asked Questions About Wireless Network Testing

Frequently Asked Questions About Wireless Network Testing In today’s digital age, the demand for efficient and stable wireless networks is at an all-time high. With the increasing number of connected devices and applications relying on seamless connectivity, the importance of wireless network testing has never been greater. This article addresses some of the most frequently […]

Wireless Network Testing
  • by
  • November 17, 2023

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company Securonix is tracking the ongoing activity under the name SEO#LURKER. “The malicious advertisement directs the user to a compromised WordPress website gameeweb[.]com, which redirects the […]

Cyber News
  • by
  • November 17, 2023

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping attacks and port-out fraud. “The rules will help protect consumers from scammers who target data and personal information by covertly swapping SIM cards to a […]

Cyber News

Free proxies and the hidden dangers

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Data privacy continues to be a growing concern for all internet users. While the internet gives us so much more freedom and access […]

Cyber News, Cyber Threat Trends
  • by
  • November 17, 2023

Cloud Security Alliance announces new zero-trust security credential

The Cloud Security Alliance (CSA) raised the curtain Wednesday on a new credential and training materials to enable security professionals to build the knowledge they will need to implement and manage a zero-trust strategy in their organizations. “From industrial control systems to cloud computing to generative AI, the world of pervasive technology has outraced legacy […]

Cyber News, Cyber Threat Trends
  • by
  • November 17, 2023

Discover 2023’s Cloud Security Strategies in Our Upcoming Webinar – Secure Your Spot

In 2023, the cloud isn’t just a technology—it’s a battleground. Zenbleed, Kubernetes attacks, and sophisticated APTs are just the tip of the iceberg in the cloud security warzone. In collaboration with the esteemed experts from Lacework Labs, The Hacker News proudly presents an exclusive webinar: ‘Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics.’ […]

Cyber News
  • by
  • November 17, 2023

27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts

An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six months with an aim to deliver malware capable of gaining persistence, stealing sensitive data, and accessing cryptocurrency wallets for financial gain. The 27 packages, which masqueraded as popular legitimate Python libraries, attracted thousands of downloads, […]

Cyber News