Cyber Defense Advisors

News

  • by
  • July 25, 2024

Robot dog trained to jam wireless devices during police raids

Graham CLULEY July 25, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial The US Department of Homeland Security has unveiled a dog-like robot that it says has been adapted to jam the connectivity of smart home devices. The DHS’s purchase of “NEO,” developed by Ghost Robotics, was announced to attendees […]

Cyber News

Top Ten Changes Introduced by CMMC Rule 32

Top Ten Changes Introduced by CMMC Rule 32 Ensure Your Compliance & Stay Ahead of the Curve Hold onto your keyboards, folks! The Department of Defense (DoD) is unleashing Rule 32, bringing a whirlwind of updates to the Cybersecurity Maturity Model Certification (CMMC) framework. These changes are set to revolutionize how contractors within the defense […]

Cyber Thoughts
  • by
  • July 25, 2024

SEXi / APT Inc ransomware – what you need to know

SEXi? Seriously? What are you talking about this time? Don’t worry, I’m not trying to conjure images in your mind of Rod Stewart in his iconic leopard print trousers. Instead, I want to warn you about a cybercrime group that has gained notoriety for attacking VMware ESXi servers since February 2024. Excuse me for not […]

Cyber News
  • by
  • July 25, 2024

North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps with names such as Andariel, Nickel […]

Cyber News
  • by
  • July 25, 2024

6 Types of Applications Security Testing You Must Know About

Application security testing is a critical component of modern software development, ensuring that applications are robust and resilient against malicious attacks. As cyber threats continue to evolve in complexity and frequency, the need to integrate comprehensive security measures throughout the SDLC has never been more essential. Traditional pentesting provides a crucial snapshot of an application’s […]

Cyber News
  • by
  • July 25, 2024

Data Wallets Using the Solid Protocol

I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership. This week, we announced a digital wallet based on the Solid architecture. Details are here, but basically a digital wallet is a repository for personal data and documents. Right now, […]

Cyber News
  • by
  • July 25, 2024

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams. “These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals,” the company said. “They targeted primarily […]

Cyber News
  • by
  • July 25, 2024

Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security

The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools provide little protection against browser-based threats, leaving organizations exposed. Modern cybersecurity requires a new approach based on the protection of the browser itself, which offers […]

Cyber News
  • by
  • July 25, 2024

Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit to access other services and sensitive data in an unauthorized manner. Tenable has given the vulnerability the name ConfusedFunction. “An attacker could escalate their privileges to the Default Cloud Build Service Account and access numerous […]

Cyber News