Cyber Defense Advisors

News

  • by
  • June 19, 2023

Introducing AI-guided Remediation for IaC Security / KICS

While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices, the speed and flexibility that IaC provides can also introduce the potential for misconfigurations and security vulnerabilities.  IaC allows organizations to define and manage their infrastructure using machine-readable configuration files, which are

Cyber News, Cyber Threat Trends
  • by
  • June 19, 2023

Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems

Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems. “As of now, these samples are still largely undetected and very little information is available about any of them,” Bitdefender researchers Andrei Lapusneanu and Bogdan Botezatu said in a preliminary report published on Friday. The […]

Cyber News, Cyber Threat Trends
  • by
  • June 19, 2023

Decoding Identity and Access Management For Organizations and Consumers

Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies.

Cyber News, Cyber Threat Trends
  • by
  • June 19, 2023

Generative AI Has Its Risks, But the Sky Isn’t Falling

The threat organizations face with GenAI is not new, but it could speed how quickly private data reaches a wider audience.

Cyber News, Cyber Threat Trends
  • by
  • June 19, 2023

US Investors Sniffing Around Blacklisted NSO Group Assets

Pressure mounts on the NSO Group’s business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse.

Cyber News, Cyber Threat Trends

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader­or of an attached peripheral device­during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used […]

Cyber News, Cyber Threat Trends

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader­or of an attached peripheral device­during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used […]

Cyber News, Cyber Threat Trends

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader­or of an attached peripheral device­during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used […]

Cyber News, Cyber Threat Trends

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader­or of an attached peripheral device­during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used […]

Cyber News, Cyber Threat Trends