Cyber Defense Advisors

News

  • by
  • November 27, 2023

How to Handle Retail SaaS Security on Cyber Monday

If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click, sale, and engagement will be captured by a CRM platform. Inventory applications will trigger automated re-orders; communication tools will send automated email and text messages confirming sales and sharing shipping information. SaaS applications supporting retail efforts will […]

Cyber News
  • by
  • November 27, 2023

The crazy world of ransomware

The CRAZY world of ransomware – keynote by cybersecurity expert Graham Cluley Watch this video on YouTube Here’s a bit of fun. A video of me talking for twenty minutes about ransomware – specifically some of the more bonkers stories from the world of ransomware. Be sure to check out my YouTube video above, or […]

Cyber News
  • by
  • November 27, 2023

Why IT teams should champion AI in the workplace, and deploy secure AI tools safely to their teams

Graham Cluley Security News is sponsored this week by the folks at Glide. Thanks to the great team there for their support! AI technology is quickly finding it’s footing in the workplace. IT teams need to lead the charge on AI adoption at their companies to ensure it happens safely, securely, and successfully. There are […]

Cyber News
  • by
  • November 27, 2023

Ethyrial: Echoes of Yore hacked! 17,000 game accounts “lost”

Graham CLULEY November 27, 2023 Promo Protect all your devices, without slowing them down. Free 30-day trial Multi-player online role-playing videogame “Ethyrial: Echoes of Yore” has suffered a ransomware attack which saw the deletion of every player’s account and the loss of all characters. On Thursday last week, the game’s official Discord channel announced that […]

Cyber News
  • by
  • November 27, 2023

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

A new study has demonstrated that it’s possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults that occur while the connection is being established. The Secure Shell (SSH) protocol is a method for securely transmitting commands and logging in to a […]

Cyber News
  • by
  • November 27, 2023

Secret White House Warrantless Surveillance Program

There seems to be no end to warrantless surveillance: According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected […]

Cyber News
  • by
  • November 27, 2023

U.S., U.K., and Global Partners Release Secure AI System Development Guidelines

The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the development of secure artificial intelligence (AI) systems. “The approach prioritizes ownership of security outcomes for customers, embraces radical transparency and accountability, and establishes organizational structures where secure design is a top priority,” the U.S. Cybersecurity and Infrastructure […]

Cyber News

Frequently Asked Questions About Virtual Chief Information Officer (vCIO)

Frequently Asked Questions About Virtual Chief Information Officer (vCIO) In a world driven by digital transformation, businesses of all sizes face the challenge of managing their IT infrastructure effectively. This challenge has given rise to a new solution: the Virtual Chief Information Officer, or vCIO. If you’ve heard the term but are still unsure about […]

Virtual Chief Information Officer (vCIO)

Frequently Asked Questions About Penetration Testing

Frequently Asked Questions About Penetration Testing In the world of cybersecurity, staying ahead of potential threats is paramount. One effective way to do this is through penetration testing, a practice that simulates real-world attacks on a system to identify vulnerabilities before malicious hackers can exploit them. If you’re new to the concept of penetration testing […]

Penetration Testing