Remove Authentication Remove Groups Remove Malware
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 330
article thumbnail

More than one-third of cloud environments are critically exposed, says Tenable

Network World

End-user organizations have their part in the blame for this, said Jeremy Roberts, senior research director at Info-Tech Research Group, and unconnected with the study. This situation is in part down to human nature, according to Scott Young, principal advisory director at Info-Tech Research Group.

Cloud 505
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 246
article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO Business Intelligence

In the past few months, infostealer malware has gained ground. Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS). Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS).

Firewall 246
article thumbnail

Bybit Hack: $1.46 Billion Crypto Heist Points to North Korea's Lazarus Group

SecureWorld News

Dubai-based exchange Bybit was targeted in a malware-driven attack that resulted in the theft of approximately $1.46 With investigators rapidly tracing the digital breadcrumbs, several experts have now pointed to North Korea's notorious Lazarus Group as the likely culprit behind the audacious breach. billion in crypto assets.

Groups 82
article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.

Malware 103
article thumbnail

Using Privileged Access Management to protect Active Directory

CIO Business Intelligence

AD is a high-priority target for cyber criminals because compromising it enables them to: Distribute malware and/or ransomware on a massive number of endpoints: Hackers can achieve such a large footprint on end-user devices and internal systems that recovery at scale becomes impossible.