Cyber Defense Advisors

News

Why You Shouldn’t Ignore Vulnerability Assessments

Why You Shouldn’t Ignore Vulnerability Assessments In the expansive world of cybersecurity, the term “vulnerability assessment” may sound like just another jargon phrase tossed around by IT professionals. But in truth, it stands as a critical frontline defense against threats that can compromise personal, corporate, or even national security. Here’s a dive into what vulnerability […]

Vulnerability Assessment
  • by
  • December 7, 2023

BlackSuit ransomware – what you need to know

What’s going on? A cybercriminal group calling itself BlackSuit has claimed responsibility for a series of ransomware attacks, including breaches at schools in central Georgia. And earlier in the year, a zoo in Tampa Bay was targeted by the same hacking gang. Meanwhile, liberal arts college DePauw University in Indiana says that it was recently […]

Cyber News

Why You Shouldn’t Ignore Penetration Testing and Exploitation Assessments

Why You Shouldn’t Ignore Penetration Testing and Exploitation Assessments Have you ever seen a fortress with robust walls and assumed it’s impregnable? It’s tempting to believe that once a castle is built, its defenses are absolute. But as history shows, no fortress is truly invulnerable. In the same vein, no matter how advanced or sophisticated […]

Penetration Testing and Exploitation Assessment
  • by
  • December 7, 2023

Finally! Facebook and Messenger are getting default end-to-end encryption. And not everyone is happy…

It’s taken a while, but it finally looks like end-to-end encrypted conversations are going to become a reality for users of Facebook and Messenger. In a blog post, Loredana Crisan, Meta’s Head of Messenger, announced that the company has begun to roll out end-to-end encryption (E2EE) for personal chats and calls. The good news?  Meta […]

Cyber News

Why You Shouldn’t Ignore Disaster Recovery Programs

Why You Shouldn’t Ignore Disaster Recovery Programs Imagine having built a stunning sandcastle right by the water’s edge. Hours of effort, meticulous attention to detail, ensuring every tower and turret stands proud. Now, imagine a sudden wave, washing away your creation in seconds. This might seem like a harmless event at the beach, but in […]

Disaster Recovery Program

Why You Shouldn’t Ignore Business Continuity Programs

Why You Shouldn’t Ignore Business Continuity Programs Imagine a major storm hits your city, causing widespread power outages. Or perhaps a cyberattack brings your company’s critical systems to a screeching halt. Situations like these can be detrimental to businesses, especially if there isn’t a well-thought-out plan in place. This is where Business Continuity Programs (BCPs) […]

Business Continuity Program

Why Businesses Think it is Smart to Implement Change Management

Why Businesses Think it is Smart to Implement Change Management Change is an ever-present force in the world of business, driven by evolving markets, technology, and consumer preferences. It’s the ability to adapt and embrace change that often separates thriving businesses from those left in the dust. Enter change management: a strategic approach that companies […]

Change Management
  • by
  • December 7, 2023

Microsoft Warns of COLDRIVER’s Evolving Evasion and Credential-Stealing Tactics

The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while simultaneously improving its detection evasion capabilities. The Microsoft Threat Intelligence team is tracking under the cluster as Star Blizzard (formerly SEABORGIUM). It’s also called Blue Callisto, BlueCharlie (or TAG-53), Calisto (alternately […]

Cyber News
  • by
  • December 7, 2023

Spying through Push Notifications

When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy on them—either for their own reasons or in response to government demands. Sen. Wyden is trying to get to the bottom of this: In a statement, Apple said […]

Cyber News