Cyber Defense Advisors

News

ITIL Compliance Management Roles & Responsibilities

ITIL Compliance Management Roles & Responsibilities ITIL, or Information Technology Infrastructure Library, is a set of best practices for IT service management that aims to align IT services with the needs and goals of the business. ITIL covers various aspects of IT service delivery, such as service strategy, service design, service transition, service operation, and […]

ITIL Compliance

ITIL Compliance Checklist

ITIL Compliance Checklist ITIL, or Information Technology Infrastructure Library, is a set of best practices for IT service management that aims to align IT services with the needs and goals of the business. ITIL covers various aspects of IT service delivery, such as service strategy, service design, service transition, service operation, and continual service improvement […]

ITIL Compliance

Pirated Software Likely Cause of Airbus Breach

Incident exposed personal information at 3200 vendors

Cyber News, Cyber Threat Trends
  • by
  • September 15, 2023

DDoS 2.0: IoT Sparks New DDoS Alert

The Internet of Things (IoT) is transforming efficiency in various sectors like healthcare and logistics but has also introduced new security risks, particularly IoT-driven DDoS attacks. This article explores how these attacks work, why they’re uniquely problematic, and how to mitigate them. What Is IoT? IoT (Internet of Things) refers to online, interconnected devices that collect and […]

Cyber News, Cyber Threat Trends
  • by
  • September 15, 2023

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers

An ongoing campaign is targeting Facebook Business accounts with bogus messages to harvest victims’ credentials using a variant of the Python-based NodeStealer and potentially take over their accounts for follow-on malicious activities.  “The attacks are reaching victims mainly in Southern Europe and North America across different segments, led by the manufacturing services and technology

Cyber News, Cyber Threat Trends

ITIL Compliance Management – A ´How To´ Guide

ITIL Compliance Management – A ´How To´ Guide ITIL compliance management is the process of ensuring that IT services, processes, and systems follow the standards and guidelines established by ITIL, as well as the enterprise policies and legal requirements that apply to the organization. ITIL compliance management is not an official process in ITIL, but […]

ITIL Compliance

Redfly Group Compromises National Power Grid

Symantec warns of mounting threat to critical infrastructure

Cyber News, Cyber Threat Trends

Top blockchain Cybersecurity threats to watch out for

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Approximately 57 cryptocurrency thefts occurred in just the first quarter of 2023, echoing similarly disastrous results in 2022, when fraudsters relied on a wide […]

Cyber News, Cyber Threat Trends

Microsoft, Apple versus China, spyware actors

It’s a cat-and-mouse struggle as tech giants Microsoft and Apple deal with persistent threats from China state actors and Pegasus spyware.

Cyber News, Cyber Threat Trends