article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. And there is a bit of a longer version for that answer. It's a lot more complex than it seems at first."

Malware 67
article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 57
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HeadCrab 2.0: Evolving Threat in Redis Malware Landscape

Aqua Security

At the beginning of 2023, Aqua Nautilus researchers uncovered HeadCrab - an advanced threat actor utilizing a state-of-the-art, custom-made malware that compromised 1,200 Redis servers. Recently, our researchers detected a new version of the HeadCrab malware targeting our honeypots.

Malware 95
article thumbnail

Microsoft Catches APTs Using ChatGPT for Vuln Research, Malware Scripting

Ooda Loop

Microsoft’s threat intelligence team recently partnered with OpenAI to produce a report on threat actors using LLMs to streamline vulnerability research, targeting, and malware development.

Malware 45
article thumbnail

Escalating Malware Tactics Drive Global Cybercrime Epidemic

Ooda Loop

The average malware detections rose 80% in Q4 2023. Most of the increased malware instances affected the Americas and Asia-Pacific.

Malware 59
article thumbnail

Guarantee that Your Enterprise Will Recover from a Ransomware or Malware Cyberattack

CIO

In recent research, IDC found that 87% of organizations impacted by ransomware in the past year had to pay a ransom to recover their data. The “sting” of a ransomware or malware attack is removed quickly, efficiently, and comprehensively.

Malware 246
article thumbnail

Bumblebee Malware Distributed Via Trojanized Installer Downloads

SecureWorks

Type: Blogs Bumblebee Malware Distributed Via Trojanized Installer Downloads Restricting the download and execution of third-party software is critically important. Learn how CTU™ researchers observed Bumblebee malware distributed via trojanized installers for popular software such as Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace.

Malware 91