Monthly Archives: April 2018
Worth the Risk: Understanding How Managed Services Impact Cyber Security
Every decision has its trade-offs. Whether your background is in business or technology, it’s likely one of the first trade secrets you learned. That’s part of the reason that putting […]
Expert devised a exploit for a Code Execution vulnerability in NVIDIA Tegra Chipsets
Security researchers Kate Temkin discovered a vulnerability in the NVIDIA Tegra chipsets that could be exploited for the execution of custom code on locked-down devices. The expert devised an exploit, dubbed Fusée Gelée, […]
Police shut down the biggest DDoS-for-hire service (webstresser.org) and arrested its administrators
The European police have shut down webstresser.org, the world’s biggest DDoS-for-hire service, that allowed crooks to launch over 4 million attacks. An international operation dubbed conducted by the European law enforcement […]
Google Project Zero hacker discloses a Zero-Day in Windows Lockdown Policy
Google researcher has publicly disclosed a Windows 10 zero-day that could be exploited by attackers to bypass Windows Lockdown Policy on systems with User Mode Code Integrity (UMCI). Google has publicly […]
Enter to Win a 4 Day Ethical Hacker Online Course by Hacker.House
CDM Readers, we are thrilled to be partnering with Hacker.House to offer one lucky winner a 4 day ethical hacker online course. You’ll be learning from some of the smartest […]
CDM Annual #RSAConference Edition eMagazine Now Available!
#RSAConferece USA 2018 may have winded down but the excitement from meeting so many award winners and handing out thousands of copies of our PRINT EDITION was a total blast […]
CDM Launching Free InfoSec Research Library
On top of our more than 60 editions of Cyber Defense eMagazines, all available online for free, we’ve decided to launch an INFOSEC RESEARCH LIBRARY. You can visit the library […]
SunTrust unfaithful employee may have stolen data on 1.5 Million customers
SunTrust Banks Inc announced it discovered that a former employee may have attempted to download information on nearly 1.5 million clients and share it a criminal organization. A former employee […]
This advanced cybersecurity degree shows why strategy is your best security measure.
The biggest cyber threat to an organization is the one that hasn’t been launched yet — the ambush that leaves cybersecurity professionals scrambling to minimize damage while still having to […]
RSA Conference 2018 – An Incredible Show Wrapping Up
It was great to meet so many of our readers at #RSAC this year. We gave out thousands of copies of our print edition of the magazine and enjoyed the […]
RSAC 2018 – Incredible Show – Innovative Winners!
Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine has spent the past six months scouring the globe and found nearly 3,000 companies who create and offer the […]
aiSIEM: The Smart SIEM with Actionable Intelligence
Does your business need to mitigate the security breach risk by minimizing the Mean Time-to- Identify (MTTI) and Mean-Time-to-Resolve (MTTR) to the lowest? Well, Read on. Security Information and Event […]
Global Threat Intelligence Vendor Landscape for 2018
Cyber Defense Magazine is pleased to provide this Global Threat Intelligence Vendor Landscape for 2018. PDF or FLIPBOOK Threat Intelligence has emerged as both an integral component of effective cyber defense […]
Meet a Cybersecurity Leader at the Intersection of Military and Civilian Intelligence
It’s one thing to complete a rigorous advanced degree in cybersecurity— it’s another to finish two at once. Meet that rare professional, Major Michael Perrottet, who simultaneously completed the Brown […]
Android Alert: HiddenMiner Android Cryptocurrency miner can brick your device
Researchers at Trend Micro recently discovered a new strain of Android miner dubbed ANDROIDOS HIDDENMINER that can brick infected devices Crooks are looking with increasing interest cryptocurrency mining malware developed […]
We’re Releasing The Global Threat Intelligence Vendor Landscape at RSA Conference 2018
Cyber Defense Magazine will be releasing our first Quarterly Vendor Landscape report at the RSA Conference 2018. Each quarter we will cover a different major INFOSEC topic, showing the market […]
After Cambridge Analytica scandal Facebook announces Election security Improvements
After Cambridge Analytica case, Facebook announced security improvements to prevent future interference with elections. Facebook is under the fire after the revelation of the Cambridge Analytica case and its role in the […]
Nation State Attacks Continue Unimpeded; So Why Haven’t We Stopped Them?
There’re no big surprises in the recent Technical Alert issued by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI). Once again, we’re hearing that nation states […]
New ThreadKit exploit builder used to spread banking Trojan and RATs
A recently discovered Microsoft Office document exploit builder kit dubbed ThreadKit has been used to spread a variety of malware, including RATs and banking Trojans. Security experts at Proofpoint recently discovered […]