article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 198
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

The Internet of Things (IoT) is a permanent fixture for consumers and enterprises as the world becomes more and more interconnected. By 2027, the global number of connected IoT devices is projected to exceed 29 billion, a significant increase from the 16.7 billion devices reported in 2023.

IoT 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Window Snyder’s new startup Thistle Technologies raises $2.5M seed to secure IoT devices

TechCrunch

million in seed funding from True Ventures with the goal of helping IoT manufacturers reliably and securely deliver software updates to their devices. Thistle lands on the security scene at a time when IoT needs it most. Mirai had ensnared thousands of IoT devices into its network at the time of the attack.

IoT 207
article thumbnail

New botnet Torii showcases next stage of IoT abuse, researchers say

The Parallax

Security researchers have caught hackers lashing together Internet-connected devices in a botnet they’re calling Torii, which uses techniques not seen in an IoT botnet before—including intercepting and stealing data, and using the Tor Project network to hide its network traffic. 5 questions to ask before buying an IOT device.

IoT 183
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 147
article thumbnail

AI in the Enterprise: 5 key findings of AI usage and threat trends

CIO

Additionally, ThreatLabz uncovered a malware campaign in which attackers created a fake AI platform to exploit interest in AI and trick victims into downloading malicious software. Zscalers zero trust architecture delivers Zero Trust Everywheresecuring user, workload, and IoT/OT communicationsinfused with comprehensive AI capabilities.

article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

At the end of the day, it’s all about patient outcomes and how to improve the delivery of care, so this kind of IoT adoption in healthcare brings opportunities that can be life-changing, as well as simply being operationally sound. Why Medical IoT Devices Are at Risk There are a number of reasons why medical IoT devices are at risk.

IoT 151