Cyber Defense Advisors

News

  • by
  • December 14, 2022

New GoTrim Botnet Attempting to Break into WordPress Sites’ Admin Accounts

A new Go-based botnet has been spotted scanning and brute-forcing self-hosted websites using the WordPress content management system (CMS) to seize control of the targeted systems. “This new brute forcer is part of a new campaign we have named GoTrim because it was written in Go and uses ‘:::trim:::’ to split data communicated to and […]

Cyber News, Cyber Threat Trends

Introducing Secure Firewall version 7.3

Introduction to Cisco Secure Firewall 7.3 Cisco’s latest release of Secure Firewall operating system, Secure Firewall Threat Defence Version 7.3, addresses key concerns for today’s firewall customers. The 7.3 release delivers more features to the three key outcomes: see and detect more threats faster in an increasingly encrypted environment, simplify operations, and lower the TCO […]

Cyber News, Cyber Threat Trends

Hacking Boston’s CharlieCard

Interesting discussion of vulnerabilities and exploits against Boston’s CharlieCard.

Cyber News, Cyber Threat Trends

Hacking Boston’s CharlieCard

Interesting discussion of vulnerabilities and exploits against Boston’s CharlieCard.

Cyber News, Cyber Threat Trends

New Google Tool Helps Devs Root Out Open Source Bugs

Free OSV-Scanner searches transitive dependencies

Cyber News, Cyber Threat Trends

New Google Tool Helps Devs Root Out Open Source Bugs

Free OSV-Scanner searches transitive dependencies

Cyber News, Cyber Threat Trends

The Upcoming UK Telecoms Security Act Part Two: Changing Mindset from Stick to Carrot

In our last blog, we gave a rundown of what the Telecommunications (Security) Act (TSA) is, why it’s been introduced, who it affects, when it starts, and how firms can prepare. Here, we take a closer look into the themes introduced by the Act, explore how the telecoms industry can explore zero trust to further […]

Cyber News, Cyber Threat Trends
  • by
  • December 14, 2022

COVID-bit: the wireless spyware trick with an unfortunate name

It’s not the switching that’s the problem, it’s the switching of the switching!

Cyber News, Cyber Threat Trends