article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO

In the past few months, infostealer malware has gained ground. Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS). Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS).

Firewall 148
article thumbnail

AI in the Enterprise: 5 key findings of AI usage and threat trends

CIO

Additionally, ThreatLabz uncovered a malware campaign in which attackers created a fake AI platform to exploit interest in AI and trick victims into downloading malicious software. Enterprises must rethink security strategies to account for new vulnerabilities, expanded attack surfaces, and AI-fueled cyberattacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

Defensive Strategies in the AI Era Defending in the AI era demands both conventional and new approaches. GenAI and Malware Creation Our research into GenAI and malware creation shows that while AI can't yet generate novel malware from scratch, it can accelerate attackers' activities.

Malware 97
article thumbnail

Article: Q&A on the Book Cybersecurity Threats, Malware Trends and Strategies

InfoQ Culture Methods

The book Cybersecurity Threats, Malware Trends and Strategies by Tim Rains provides a overview of the threat landscape over a twenty year period. It provides insights and solutions that can be used to develop an effective cybersecurity strategy and improve vulnerability management. By Ben Linders, Tim Rains.

Malware 104
article thumbnail

Website spoofing: risks, threats, and mitigation strategies for CIOs

CIO

Allow me to delve deeply into the risks associated with website spoofing, its manipulation of unsuspecting users, the far-reaching repercussions, and the strategies I believe are effective in tackling this ever-evolving menace. In the past year, over 48% of the mail sent globally was found to be spam.

Strategy 158
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter. Collectively, they accounted for 77% of the quarter’s malware infections.

article thumbnail

New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks

Palo Alto Networks

This structured framework enables organizations to systematically assess risks, develop proactive defense strategies and enhance the security of GenAI systems against adversarial manipulation. Your key defense mechanisms must be tailored to each category of adversarial prompt attacks and work together in a layering of defenses.

Security 110