Week 6: Cybersecurity Threat

 

 

This week’s blog discussion focuses on a broad variety of new cybersecurity threats that do exist. We live in an age where cybersecurity threats are becoming increasingly imperative – this doesn’t mean that cybersecurity threats of the past weren’t as imperative as cybersecurity threats of today. The difference is that cybersecurity threats in this current stage are far more sophisticated than in the past due to the innovation evolution of technology. 

As cybersecurity teams tighten their defenses lines with the state-of-the art technology to prevent and mitigate security threats (penetration) from cyber criminals, in return, cyber criminals are researching sophisticated methods that can penetrate those lines of security defenses. The following are lists of some new cybersecurity threat courtesy of trellix.com:

1.      Cyberespionage Events Targeting Southeast Asian Government Linked To Stately Taurus (aka Mustang Panda).

2.      Vulnerable Openfire Messaging Servers Under Attack (CVE-2023-32315).

3.      Threat Profile: Rhadamanthys.

4.      Microsoft Teams Chat Used To Deliver DarkGate Loader.

5.      Threat Profile: DarkGate.

6.      ZenRAT Steals Data From Windows Users.

You can visit trellix.com to read more about the many different types of new cybersecurity threats they have lasted on their platform. Cyber criminals have a variety of viruses (malware) at their disposal, and there are many ways that cyber criminals can implement those viruses to effectively penetrate the defenses of any existence networks. For example, cyber criminals are always on the lookout for vulnerability on a network before making their moved. One common vulnerable spot on any network that makes it easier for cyber criminals to penetrate will be through. Phishing is when attackers attempt to track users into clicking on a bad (virus) link which can end up penetrating the victim network/computer by downloading malware. 

This is one of several reasons why the company IT Department of a company will notify employees and test execute a test by sending them fake unidentifiable email asking them to click on a link within such email. Many of new cybersecurity threats that are listed on the trellix.com website explain how cyber criminals implement and execute them.

Comments

Popular posts from this blog