article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 198
article thumbnail

AI in the Enterprise: 5 key findings of AI usage and threat trends

CIO

Enterprises are increasingly adopting AI tools to enhance productivity, automate workflows, and accelerate decision-making. The report reveals how enterprises worldwide and across industries are using and managing AI/ML tools, highlighting both their benefits and security concerns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 147
article thumbnail

A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In 

Ooda Loop

Actors are using the previously undocumented tool, which features very sophisticated methods of avoiding detection by email services, in new phishing campaigns. The […] The post A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In appeared first on OODAloop.

Malware 59
article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO

In the past few months, infostealer malware has gained ground. Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS). Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS).

Firewall 148
article thumbnail

Dulling the impact of AI-fueled cyber threats with AI

CIO

It can also create cyber threats that are harder to detect than before, such as AI-powered malware, which can learn from and circumvent an organization’s defenses at breakneck speed. Threat actors have their eyes set on AI-powered cybersecurity tools that gather information across data sets, which can include confidential information.

article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

Your organization likely uses AI tools already, whether you know it or not. Establish governance and rules of engagement for AI tool usage, tailored to your existing data security requirements. AI serves as a capable co-pilot for less skilled attackers and can regenerate or impersonate certain existing types of malware.

Malware 95