article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO

In the past few months, infostealer malware has gained ground. Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS). Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS).

Firewall 148
article thumbnail

8 major IT disasters of 2024

CIO

Friendly fire In February, Chinese PC maker Acemagic acknowledged shipping machines with malware installed on them. The admission came after YouTuber The Net Guy found malware on Acemagic mini PCs when testing them. The PCs shipped with the Backdoor.Bladabindi malware, as well as RedLine Stealer.

Malware 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AI in the Enterprise: 5 key findings of AI usage and threat trends

CIO

Additionally, ThreatLabz uncovered a malware campaign in which attackers created a fake AI platform to exploit interest in AI and trick victims into downloading malicious software. Enterprises must rethink security strategies to account for new vulnerabilities, expanded attack surfaces, and AI-fueled cyberattacks.

article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

Defensive Strategies in the AI Era Defending in the AI era demands both conventional and new approaches. GenAI and Malware Creation Our research into GenAI and malware creation shows that while AI can't yet generate novel malware from scratch, it can accelerate attackers' activities.

Malware 99
article thumbnail

Article: Q&A on the Book Cybersecurity Threats, Malware Trends and Strategies

InfoQ Culture Methods

The book Cybersecurity Threats, Malware Trends and Strategies by Tim Rains provides a overview of the threat landscape over a twenty year period. It provides insights and solutions that can be used to develop an effective cybersecurity strategy and improve vulnerability management. By Ben Linders, Tim Rains.

Malware 104
article thumbnail

Website spoofing: risks, threats, and mitigation strategies for CIOs

CIO

Allow me to delve deeply into the risks associated with website spoofing, its manipulation of unsuspecting users, the far-reaching repercussions, and the strategies I believe are effective in tackling this ever-evolving menace. In the past year, over 48% of the mail sent globally was found to be spam.

Strategy 158
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter. Collectively, they accounted for 77% of the quarter’s malware infections.