Cyber Defense Advisors

News

  • by
  • December 8, 2022

Explorations in the spam folder–Holiday Edition

Watch ThreatWise TV: Explorations in the spam folder The spam folder: that dark and disregarded corner of every email account, full of too-good-to-be-true offers, unexpected shipments, and supposedly free giveaways. You’re right to ignore this folder; few good things come from exploring it. But every once in a while one of these misleading, and sometimes […]

Cyber News, Cyber Threat Trends

Leaked Signing Keys Are Being Used to Sign Malware

A bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware. […]

Cyber News, Cyber Threat Trends

What is YTQ?

What is CRQC? Widespread interest in quantum computing continues to expand as computer innovators, scientists, and technology industry leaders vie to position themselves at the top of the pack for quantum computing prowess.  As the buzz continues, I’d like to discuss Cryptographically Relevant Quantum Computers (CRQC) in simple terms. A CRQC uses quantum mechanical phenomena […]

Cyber News, Cyber Threat Trends

Pet Dog Unmasks Drug Trafficker on Encrypted Chat

Police studied photos sent via EncroChat to reveal users

Cyber News, Cyber Threat Trends

Pet Dog Unmasks Drug Trafficker on Encrypted Chat

Police studied photos sent via EncroChat to reveal users

Cyber News, Cyber Threat Trends

Microsoft Warns Cryptocurrency Firms Against Complex Cyber-Attacks

Attacks included fraud, vulnerability exploitation, fake applications and info stealer deployments

Cyber News, Cyber Threat Trends
  • by
  • December 8, 2022

Apple finally adds encryption to iCloud backups

Apple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups, contacts, notes, photos, and wallet passes. The company also announced hardware Security Keys for Apple ID.

Cyber News, Cyber Threat Trends
  • by
  • December 8, 2022

Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack

An Iranian advanced persistent threat (APT) actor known as Agrius has been attributed as behind a set of data wiper attacks aimed at diamond industries in South Africa, Israel, and Hong Kong. The wiper, codenamed Fantasy by ESET, is believed to have been delivered via a supply chain attack targeting an Israeli software suite developer as part […]

Cyber News, Cyber Threat Trends
  • by
  • December 8, 2022

Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers

An Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target South Korean users by capitalizing on the recent Itaewon Halloween crowd crush to trick users into downloading malware. The discovery, reported by Google Threat Analysis Group researchers Benoît Sevens and Clément Lecigne, is the latest set of attacks perpetrated by ScarCruft, which […]

Cyber News, Cyber Threat Trends