article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 198
article thumbnail

Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia 

Ooda Loop

The threat group is using PXA Stealer, a new Python-based malware. It can decrypt a victim’s master password to steal other […] The post Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia appeared first on OODAloop.

Groups 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 147
article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO

In the past few months, infostealer malware has gained ground. Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS). Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS).

Firewall 148
article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

The Muddled Libra group has even deployed AI-generated deepfakes in their intrusions. GenAI and Malware Creation Our research into GenAI and malware creation shows that while AI can't yet generate novel malware from scratch, it can accelerate attackers' activities.

Malware 102
article thumbnail

New Grelos skimmer variant reveals overlap in Magecart group activities, malware infrastructure

CTOvision

A new variant of a skimmer has revealed the increasingly muddy waters associated with tracking groups involved in Magecart-style attacks. On Wednesday, researchers from RiskIQ described how a new Grelos […].

Groups 159
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. Also known as APT29, this group is affiliated with Russia’s government. That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.