article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets.

Industry 198
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

Security researchers are warning of a significant global rise in Chinese cyber espionage activity against organizations in every industry. Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets.

Industry 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Play is an ‘order of magnitude’ better at blocking malware

The Parallax

During a month that’s seen Android malware new and old plague the world’s most popular mobile operating system, Google says its Play Store is becoming more civilized and less like the Wild West. You have a lower probability of being infected by malware from Play than being hit by lightning,” Ahn says. READ MORE ON ANDROID SECURITY.

Malware 184
article thumbnail

A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In 

Ooda Loop

Researchers believe it may become one of the most popular infostealers in recent years. The […] The post A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In appeared first on OODAloop. A new remote access trojan (RAT) called Resolver RAT is being seen across the globe in phishing emails.

Malware 59
article thumbnail

AI in the Enterprise: 5 key findings of AI usage and threat trends

CIO

5 key findings: AI usage and threat trends The ThreatLabz research team analyzed activity from over 800 known AI/ML applications between February and December 2024. ThreatLabz researchers demonstrated how DeepSeek can be manipulated to quickly generate phishing pages that mimic trusted brands. Here are the notable findings: 1.

article thumbnail

New botnet Torii showcases next stage of IoT abuse, researchers say

The Parallax

Security researchers have caught hackers lashing together Internet-connected devices in a botnet they’re calling Torii, which uses techniques not seen in an IoT botnet before—including intercepting and stealing data, and using the Tor Project network to hide its network traffic. Hron says it heralds a “ new era of IoT botnets.”.

IoT 183
article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

GenAI and Malware Creation Our research into GenAI and malware creation shows that while AI can't yet generate novel malware from scratch, it can accelerate attackers' activities. AI serves as a capable co-pilot for less skilled attackers and can regenerate or impersonate certain existing types of malware.

Malware 99