article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 198
article thumbnail

8 major IT disasters of 2024

CIO

The miscalculation happened at the same time as the Education Department overhauled the Free Application for Federal Student Aid, or FAFSA, which is used to determine eligibility for federal Pell Grants and other financial aid. Friendly fire In February, Chinese PC maker Acemagic acknowledged shipping machines with malware installed on them.

Malware 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AI in the Enterprise: 5 key findings of AI usage and threat trends

CIO

5 key findings: AI usage and threat trends The ThreatLabz research team analyzed activity from over 800 known AI/ML applications between February and December 2024. The surge was fueled by ChatGPT, Microsoft Copilot, Grammarly, and other generative AI tools, which accounted for the majority of AI-related traffic from known applications.

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 147
article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

Monitor external AI usage, secure the AI application development lifecycle, and map the data pathways in your AI systems. Adopt AI safely by tracking AI application usage, scanning for sensitive data and implementing granular access control. However, you must also adopt AI-specific defenses to outpace attackers.

Malware 99
article thumbnail

Muhstik Malware Targets Message Queuing Services Applications

Aqua Security

Aqua Nautilus discovered a new campaign of Muhstik malware targeting message queuing services applications, specifically the Apache RocketMQ platform. Our investigation revealed that the attackers downloaded the known malware Muhstik onto the compromised instances by exploiting a known vulnerability in the platform.

Malware 98
article thumbnail

Hadooken Malware Targets Weblogic Applications

Aqua Security

Aqua Nautilus researchers identified a new Linux malware targeting Weblogic servers. When Hadooken is executed, it drops a Tsunami malware and deploys a cryptominer. In this blog, we explain the malware, its components, and how we detected

Malware 98