Cyber Defense Advisors

News

US and Japan Warn of Chinese Router Attacks

BlackTech group blamed for cyber-espionage operation

Cyber News, Cyber Threat Trends

MMRat: A new banking trojan

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Introduction: Many threat actors tend to gravitate towards using some type of remote access trojan (RAT) in their campaigns. RATs are a type […]

Cyber News, Cyber Threat Trends
  • by
  • September 28, 2023

China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Government and telecom entities have been subjected to a new wave of attacks by a China-linked threat actor tracked as Budworm using an updated malware toolset. The intrusions, targeting a Middle Eastern telecommunications organization and an Asian government, took place in August 2023, with the adversary deploying an improved version of its SysUpdate toolkit, the Symantec Threat […]

Cyber News, Cyber Threat Trends
  • by
  • September 28, 2023

The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies

The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting against browser exploits and malware downloads, it has become increasingly inadequate and insecure in today’s SaaS-centric world. The limitations of Browser Isolation, such as degraded browser performance and inability to tackle

Cyber News, Cyber Threat Trends
  • by
  • September 28, 2023

CAPTCHAs Easy for Humans, Hard for Bots

Proton is aiming for the sweet spot between security, privacy, and accessibility with its CAPTCHA.

Cyber News, Cyber Threat Trends

Vegas Casinos Slowly Recover After Hit By Crippling Cyberattacks

Vegas Casinos Slowly Recover After Hit By Crippling Cyberattacks The MGM and Caesars breaches have many CISOs worried that their own company’s security efforts may need shoring up. One would hope that what happens in Vegas stays in Vegas. For cybercriminals, however, successful attacks are gambles that continuously pay off. Some of the biggest hotels […]

Cyber Thoughts

Why are Penetration Testing & Exploitation Assessments Important?

Why are Penetration Testing & Exploitation Assessments Important? In today’s digital world, where cyber threats are becoming more sophisticated and prevalent, it is crucial for organizations to test their systems and identify vulnerabilities before they can be exploited by malicious actors. One of the most effective ways to do this is through a Penetration Testing […]

Penetration Testing and Exploitation Assessment

The Pillars of a Strong Penetration Testing & Exploitation Assessment Program

The Pillars of a Strong Penetration Testing & Exploitation Assessment Program Penetration Testing and Exploitation Assessments are crucial for organizations to identify vulnerabilities and weaknesses in their systems and networks before malicious hackers can exploit them. Effective testing and assessment programs can help organizations strengthen their security posture and protect sensitive data from potential cyber-attacks.  […]

Penetration Testing and Exploitation Assessment

The Benefits of a Penetration Testing & Exploitation Assessment

The Benefits of a Penetration Testing & Exploitation Assessment In today’s digital age, cybersecurity has become an increasingly important concern for businesses of all sizes. With countless stories of data breaches and hacking attempts making headlines, it’s no wonder that organizations are investing more resources into protecting their networks and systems. One valuable tool in […]

Penetration Testing and Exploitation Assessment