article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 330
article thumbnail

Microsoft Suspends Dev Accounts That Used Its Certs to Authenticate Malware

IT Toolbox

Multiple threat actors have leveraged malware signed with fraudulently obtained certificates to deploy Hive and possibly other ransomware. The post Microsoft Suspends Dev Accounts That Used Its Certs to Authenticate Malware appeared first on.

Malware 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ask.com serves as a conduit for malware - again

Network World

In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.

Malware 369
article thumbnail

Cookie theft threat: When Multi-Factor authentication is not enough

Tech Republic Security

A lot of companies have deployed multi-factor authentication, yet attackers have some ways to bypass it—the most used one being cookie theft. The post Cookie theft threat: When Multi-Factor authentication is not enough appeared first on TechRepublic.

article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

Cybercriminals began to use social engineering techniques to trick people into giving up their personal information, and they developed new malware that could evade traditional security measures. This philosophy demands rigorous and continuous authentication and authorization procedures before granting access to any resources or systems.

Firewall 396
article thumbnail

More than one-third of cloud environments are critically exposed, says Tenable

Network World

It cited the MGM Resorts data breach, the Microsoft email hack, and the FBot malware targeting web servers, cloud services, and software-as-a-service, which achieves persistency and propagates on AWS via AWS IAM (identity and access management) users as three examples of how the keys could be abused.

Cloud 505
article thumbnail

How to protect your organization against the latest malware threats

Tech Republic Security

With the shift toward remote working, cybercriminals have been targeting exploits in VPN, Internet of Things, and authentication technology, says cybersecurity firm Nuspire.

Malware 436