Cyber Defense Advisors

News

  • by
  • November 21, 2022

How social media scammers buy time to steal your 2FA codes

The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server… but the content is all fake

Cyber News, Cyber Threat Trends

9 VOIP security best practices to consider for your business

Is VOIP secure? Can VOIP be hacked? Learn about why VOIP security is important and the best practices for your business to consider with our guide. The post 9 VOIP security best practices to consider for your business appeared first on TechRepublic.

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Notorious Emotet Malware Returns With High-Volume Malspam Campaign

The notorious Emotet malware has returned with renewed vigor as part of a high-volume malspam campaign designed to drop payloads like IcedID and Bumblebee. “Hundreds of thousands of emails per day” have been sent since early November 2022, enterprise security company Proofpoint said last week, adding, “the new activity suggests Emotet is returning to its full functionality acting as a […]

Cyber News, Cyber Threat Trends

Luna Moth Phishing Extortion Campaign Targets Businesses in Multiple Sectors

It leverages extortion without encryption and has cost victims hundreds of thousands of dollars

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Been Doing It The Same Way For Years? Think Again.

[Want Bob to stop complaining? Change your practices.] [Don’t delay change – it can cost you] [“Always done it that way”? Think again.] [Why you should think again about doing it the old way] [Why you should think again about doing it the same old way] As IT professionals, we all reach a certain point […]

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Customer-Managed KMS Keys vs. AWS Managed Encryption

ACM.118 Why might you choose to use a customer-managed key to protect your cloud resources This is a continuation of my series on Automating Cybersecurity Metrics. Code in the last post automatically stops a VM after deploying it to help save money when resources are created before they are needed for use. https://medium.com/cloud-security/automatically-stop-vms-on-aws-792cded54578 This post provides […]

Cyber News, Cyber Threat Trends

Breaking the Zeppelin Ransomware Encryption Scheme

Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken: The researchers said their break came when they understood that while Zeppelin used three different types of encryption keys to encrypt files, they could undo the whole scheme by factoring or computing just one of them: An ephemeral RSA-512 public key that is […]

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

How remote working impacts security incident reporting

The ability for employees to work remotely comes with many benefits, from better work-life balance to lower expenses to higher productivity. But a widely dispersed workforce can pose some great challenges for security teams, not least of which is how remote work affects security incident reporting. With companies growing more accustomed to implementing security technologies […]

Cyber News, Cyber Threat Trends
  • by
  • November 21, 2022

Google Wins Lawsuit Against Russians Linked to Blockchain-based Glupteba Botnet

Google has won a lawsuit filed against two Russian nationals in connection with the operation of a botnet called Glupteba, the company said last week. The U.S. District Court for the Southern District of New York imposed monetary sanctions against the defendants and their U.S.-based legal counsel. The defendants have also been asked to pay Google’s attorney […]

Cyber News, Cyber Threat Trends