Remove 2014 Remove Infrastructure Remove Malware
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 198
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Stoked — Manifesting Innovation in Shared Threat Intelligence

Palo Alto Networks

From Blasé to Bad Ass I was recently turned on to a TED talk that legendary skateboarder Rodney Mullen gave back in 2014. Skate at Your Own Risk (Management) The Cybersecurity and Infrastructure Security Agency (CISA ) defines threat intelligence sharing as a key part of a robust cybersecurity program. It’s pretty rad.

article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

New technologies like these are delivering dramatic efficiency gains in many areas; however, they are stressing infrastructure and creating unrealistic expectations. In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. Limited WAN Bandwidth.

WAN 109
article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

CVE-2014-6271: GNU Bash Shellshock Remote Code Execution Vulnerability Shellshock Bash Bug Remote Code Execution Exploited Zero-Day Network Cybercriminals Critical 2014 Why it’s significant: An attacker could craft an environment variable that contained both a function definition and additional malicious code.

article thumbnail

FBI Provides An Update On #SonyHack Investigation Including Some Tech Details On Attribution

CTOvision

December 19, 2014 FBI National Press Office (202) 324-3691. The FBI has determined that the intrusion into SPE’s network consisted of the deployment of destructive malware and the theft of proprietary information as well as employees’ personally identifiable information and confidential communications. Washington, D.C.

Malware 139
article thumbnail

Tapping Global Threat Intelligence To Secure Enterprise Networks

CTOvision

August 27, 2014 | 11 AM -1:30 PM EST. Ruths Chris Steakhouse, Arlington, VA. On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. Big Data CTO Cyber Security DoD and IC Bob Gourley Chris Petersen CISA Cognitio Corp Computer security Cybersecurity Malware'

Network 103