Cyber Defense Advisors

News

  • by
  • November 12, 2024

North Korean Hackers Target macOS Using Flutter-Embedded Malware

Threat actors with ties to the Democratic People’s Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform […]

Cyber News
  • by
  • November 12, 2024

Criminals Exploiting FBI Emergency Data Requests

I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same thing is true for non-technical backdoors: The advisory said that the cybercriminals were successful in masquerading […]

Cyber News
  • by
  • November 12, 2024

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more accurate, efficient, […]

Cyber News
  • by
  • November 12, 2024

Winter Fuel Payment scam targets UK citizens via SMS

Scammers have leapt at the opportunity to exploit vulnerable UK residents by sending bogus messages telling them they need to take action to receive help with their winter heating bills.  In July, the UK’s new Labour Government announced that it was limiting who was eligible for assistance with their winter fuel bills by making eligibility […]

Cyber News
  • by
  • November 12, 2024

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. “Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness,” Russian cybersecurity vendor Kaspersky said. “Threat actors leveraged an unconventional blend of […]

Cyber News

Get Ready: Our CMMC 2.0 Rule 32 Handbook Is Here!

Get Ready: Our CMMC 2.0 Rule 32 Handbook Is Here! Find Out What’s New, What’s Changed, And How to Ensure Compliance Hey there, defense contractors and everyone impacted by CMMC changes! Big news: We’ve just released a brand-new CMMC 2.0 Rule 32 Handbook, your go-to guide for navigating the latest compliance standards. Check it out […]

Cyber Thoughts
  • by
  • November 11, 2024

200,000 SelectBlinds customers have their card details skimmed in malware attack

Graham CLULEY November 11, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial SelectBlinds, a popular online retailer of blinds and shades, has disclosed a security breach that has impacted 206,238 of its customers. Hackers successfully managed to embed malware onto the company’s website, capable of stealing sensitive information, including credit […]

Cyber News
  • by
  • November 11, 2024

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using […]

Cyber News
  • by
  • November 11, 2024

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. “In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: ‘Are Bengal Cats legal in Australia?,’” […]

Cyber News