Cyber Defense Advisors

News

Study to ace five cybersecurity certification exams

Dive into CompTIA, NIST, CISSP and more with the online training offered in The 2022 Ultimate Advanced CyberSecurity Professional Certification Bundle. The post Study to ace five cybersecurity certification exams appeared first on TechRepublic.

Cyber News, Cyber Threat Trends
  • by
  • December 22, 2022

The Era of Cyber Threat Intelligence Sharing

We spent forty years defending ourselves as individuals. Trying to outsmart cybercriminals, outpower them, and when all our efforts failed, only then we considered banding together with our peers to outnumber them. Cybercriminals don’t reinvent themselves each time. Their resources are limited, and they have a limited budget. Therefore they use playbooks to attack many […]

Cyber News, Cyber Threat Trends
  • by
  • December 22, 2022

Black Hat Europe 2022 NOC: The SOC Inside the NOC

Our core mission in the NOC is network resilience. We also provide integrated security, visibility and automation, a SOC inside the NOC. In part one, we covered: Designing the Black Hat Network, by Evan Basta AP Placement Planning, by Sandro Fasser Wi-Fi Air Marshal, by Jérémy Couture, Head of SOC, Paris 2024 Olympic Games Meraki […]

Cyber News, Cyber Threat Trends
  • by
  • December 22, 2022

Black Hat Europe 2022 NOC: When planning meets execution

In this blog about the design, deployment and automation of the Black Hat network, we have the following sections: Designing the Black Hat Network, by Evan Basta AP Placement Planning, by Sandro Fasser Wi-Fi Air Marshal, by Jérémy Couture, Head of SOC, Paris 2024 Olympic Games Meraki Dashboards, by Rossi Rosario Burgos Meraki Systems Manager, […]

Cyber News, Cyber Threat Trends
  • by
  • December 22, 2022

FIN7 Cybercrime Syndicate Emerges as Major Player in Ransomware Landscape

An exhaustive analysis of FIN7 has unmasked the cybercrime syndicate’s organizational hierarchy, alongside unraveling its role as an affiliate for mounting ransomware attacks. It has also exposed deeper associations between the group and the larger threat ecosystem comprising the now-defunct ransomware DarkSide, REvil, and LockBit families. The highly active threat group, also known as Carbanak,

Cyber News, Cyber Threat Trends

Ukraine Intercepting Russian Soldiers’ Cell Phone Calls

They’re using commercial phones, which go through the Ukrainian telecom network: “You still have a lot of soldiers bringing cellphones to the frontline who want to talk to their families and they are either being intercepted as they go through a Ukrainian telecommunications provider or intercepted over the air,” said Alperovitch. “That doesn’t pose too […]

Cyber News, Cyber Threat Trends
  • by
  • December 21, 2022

Raspberry Robin Worm Strikes Again, Targeting Telecom and Government Systems

The Raspberry Robin worm has been used in attacks against telecommunications and government office systems across Latin America, Australia, and Europe since at least September 2022. “The main payload itself is packed with more than 10 layers for obfuscation and is capable of delivering a fake payload once it detects sandboxing and security analytics tools,” Trend Micro […]

Cyber News, Cyber Threat Trends

Trojaned Windows Installer Targets Ukraine

Mandiant is reporting on a trojaned Windows installer that targets Ukrainian users. The installer was left on various torrent sites, presumably ensnaring people downloading pirated copies of the operating system: Mandiant uncovered a socially engineered supply chain operation focused on Ukrainian government entities that leveraged trojanized ISO files masquerading as legitimate Windows 10 Operating System […]

Cyber News, Cyber Threat Trends
  • by
  • December 20, 2022

A Guide to Efficient Patch Management with Action1

It’s no secret that keeping software up to date is one of the key best practices in cybersecurity. Software vulnerabilities are being discovered almost weekly these days. The longer it takes IT teams to apply updates issued by developers to patch these security flaws, the more time attackers have to exploit the underlying vulnerability. Once […]

Cyber News, Cyber Threat Trends