Latest Cyberthreats and Advisories – March 17, 2023

Cybercriminals pounce on SVB collapse, privacy concerns around ChatGPT and the FBI warns of a rise in crypto scams. Here are the latest threats and advisories for the week of March 17, 2023. By John Weiler Threat Advisories and Alerts FBI Warning: Cryptocurrency Investment Schemes on the Rise The U.S. Federal Bureau of Investigation (FBI) is warning internet users of an increase in cryptocurrency investment scam schemes, which defrauded victims of over $2 billion in 2022. Cybercriminals (usually located overseas) use social media platforms, dating apps, professional networking apps and other online means to connect with targets. The criminals then…

March 17, 2023
Read More >>

Microsoft Targets Critical Outlook Zero-Day Flaw

Microsoft’s Patch Tuesday for March 2023 includes patches for more than 70 vulnerabilities, including zero-day flaws in Outlook and in Windows SmartScreen. According to Crowdstrike researchers, 40 percent of the patched vulnerabilities are remote code execution flaws, down from 48 percent last month; 31 percent are elevation of privilege flaws, up from almost 16 percent […]

The post Microsoft Targets Critical Outlook Zero-Day Flaw appeared first on eSecurityPlanet.

March 17, 2023
Read More >>

10 Network Security Threats Everyone Should Know

Network security threats weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. Because businesses face an extensive array of threats, they should carefully monitor and mitigate the most critical threats and vulnerabilities. This guide to major network security threats covers detection methods as well as mitigation strategies […]

The post 10 Network Security Threats Everyone Should Know appeared first on eSecurityPlanet.

March 17, 2023
Read More >>

What is Network Security? Definition, Threats & Protections

Network security creates shielded, monitored, and secure communications between users and assets. Despite the rapid evolution of what constitutes the users, assets, and connections, the fundamentals of networking security remain the same: block external threats, protect internal network communications, monitor the network for internal and external threats, and ensure that users only access authorized parts […]

The post What is Network Security? Definition, Threats & Protections appeared first on eSecurityPlanet.

March 15, 2023
Read More >>

BlackMamba PoC Malware Uses AI to Avoid Detection

HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms. The malware, dubbed “BlackMamba,” is the latest example of exploits that can evade even the most sophisticated cybersecurity products. While […]

The post BlackMamba PoC Malware Uses AI to Avoid Detection appeared first on eSecurityPlanet.

March 10, 2023
Read More >>

Wireshark 4.0.4 Released – What’s New!!

The latest release of Wireshark, version 4.0.4, has been launched by the Wireshark Team. This new version offers a host of improvements and updates that enhance protocol support, including several bug fixes. It can be used for a wide range of purposes,…

March 4, 2023
Read More >>

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious items will take time to implement, and could face opposition from Congress. President Biden came into office around the time of the SolarWinds and Colonial Pipeline cyber attacks, so cybersecurity […]

The post Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles appeared first on eSecurityPlanet.

March 3, 2023
Read More >>

Vulnerability Management: Definition, Process & Tools

As enterprise networks continue to grow in size and complexity, so have the misconfigurations and vulnerabilities that could expose those networks to devastating cyber attacks and breaches. Vulnerability management is the process of prioritizing and minimizing those risks. When you consider that the average Fortune 500 company has nearly 500 critical vulnerabilities, the importance of […]

The post Vulnerability Management: Definition, Process & Tools appeared first on eSecurityPlanet.

March 3, 2023
Read More >>