article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 330
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Shared malware code links SWIFT-related breaches at banks and North Korean hackers

Network World

Malware links suggest that North Korean hackers might be behind recent attacks against several Asian banks, including the theft of US$81 million from the Bangladesh central bank earlier this year. The same malware was also previously linked to an attempted theft of $1 million from Tien Phong Bank in Vietnam.

Malware 250
article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. The end of support for Windows XP, slated for April 8, 2014, is a dangerous security issue. In addition, desktops and laptops remain revenue-critical workhorses for most companies, and cannot be neglected.

WAN 273
article thumbnail

Tech Trends in 2014: Actionable Insights For Your Career

CTOvision

What follows is an interview in which Lenzner comments on trends in the year that was, elaborates on trends for the year that is, and provides tips on how professionals and businesses can take full advantage of the trends that will unfold in 2014. Q: In your opinion what are the Top 5 anticipated tech trends for 2014?

Trends 255
article thumbnail

London police charge third member of ATM hacking gang

Computer Weekly

London police arrest and charge a third man suspected of being involved in a series of ATM thefts across the UK in 2014 using malware to bypass security controls

Malware 274
article thumbnail

12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

Understand benefits of automated malware removal, not just remediation. The concept of automated remediation will be examined with new insight, along with suggestions on how to implement a machine-guided, advanced remediation strategy. Participants in this webinar will: . Learn how offensive measures can support your defensive strategy.