Cyber Defense Advisors

News

Frequently Asked Questions About Virtual Cyber Security Managers (vCSM)

Frequently Asked Questions About Virtual Cyber Security Managers (vCSM) In an increasingly interconnected world, where businesses rely heavily on digital infrastructure, the need for robust cybersecurity measures has never been greater. With cyber threats evolving at an alarming pace, organizations must stay one step ahead to protect their sensitive data and operations. One innovative solution […]

Cybersecurity Manager (vCSM)

Frequently Asked Questions About Virtual Chief Technology Officer (vCTO)

Frequently Asked Questions About Virtual Chief Technology Officer (vCTO) In a world where technology evolves at an unprecedented pace, businesses are constantly seeking ways to stay ahead of the curve. The role of Chief Technology Officer (CTO) has always been pivotal in guiding organizations through the intricacies of the digital landscape. However, a new trend […]

Virtual Chief Technology Officer (vCTO)

Frequently Asked Questions About Virtual Chief Security Officers (vCISO)

Frequently Asked Questions About Virtual Chief Security Officers (vCISO) In the rapidly evolving landscape of cybersecurity, organizations are constantly seeking innovative solutions to safeguard their digital assets. One such solution gaining popularity is the concept of Virtual Chief Security Officers, or vCISOs. As the name suggests, vCISOs are virtual or remote experts who provide crucial […]

Virtual Chief Information Security Officer (vCISO)
  • by
  • December 1, 2023

U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign-Based Agents

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Thursday sanctioned the North Korea-linked adversarial collective known as Kimsuky as well as eight foreign-based agents who are alleged to have facilitated sanctions evasion. The agents, the Treasury said, helped in “revenue generation and missile-related technology procurement that support the DPRK’s weapons […]

Cyber News
  • by
  • December 1, 2023

Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices

Zyxel has released patches to address 15 security issues impacting network-attached storage (NAS), firewall, and access point (AP) devices, including three critical flaws that could lead to authentication bypass and command injection. The three vulnerabilities are listed below – CVE-2023-35138 (CVSS score: 9.8) – A command injection vulnerability that could allow an unauthenticated attacker to […]

Cyber News
  • by
  • December 1, 2023

Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws

Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to address two security flaws that it said have come under active exploitation in the wild on older versions of its software. The vulnerabilities, both of which reside in the WebKit web browser engine, are described below – CVE-2023-42916 – An out-of-bounds […]

Cyber News
  • by
  • November 30, 2023

Not all cybercriminals are evil geniuses

Not all cybercriminals are evil geniuses | After-dinner speech by hacking expert Graham Cluley Watch this video on YouTube I thought some of you might enjoy this. Here’s a video of a recent after-dinner talk I gave, exploring (in a hopefully fun way!) whether cybercriminals are quite as smart as we sometimes think they are. […]

Cyber News

China Challenges U.S. Dominance in Cybersecurity

China Challenges U.S. Dominance in Cybersecurity Tensions Escalate as CCP’s Goals & Capabilities Expand In a significant development in the cybersecurity landscape, China is quickly narrowing the gap with the United States, challenging the long-standing U.S. supremacy in this sector. The Pentagon’s 2023 report, “Military and Security Developments Involving the People’s Republic of China,” released […]

Cyber News, Cyber Thoughts
  • by
  • November 30, 2023

Extracting GPT’s Training Data

This is clever: The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the model responds (complete transcript here). In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. This happens […]

Cyber News