article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Over the course of 2024, researchers from security firm CrowdStrike observed a 150% average increase in intrusions by Chinese threat actors worldwide, with some sectors experiencing two- to three-fold surges. The group regularly exploits vulnerabilities in public-facing web applications to gain initial access.

Industry 330
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Over the course of 2024, researchers from security firm CrowdStrike observed a 150% average increase in intrusions by Chinese threat actors worldwide, with some sectors experiencing two- to three-fold surges. The group regularly exploits vulnerabilities in public-facing web applications to gain initial access.

Industry 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025

CIO Business Intelligence

INE Securitys comprehensive cybersecurity training platform offers on-demand courses, interactive labs, and instructor-led trainings that cover the full spectrum of security domains from fundamental cyber hygiene for general staff to advanced incident response and penetration testing for IT professionals.

Training 213
article thumbnail

String of fileless malware attacks possibly tied to single hacker group

Network World

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools, and fileless malware techniques might be the work of a single group of hackers.

Malware 150
article thumbnail

Squid Game app downloaded thousands of times was really Joker malware in disguise

TechSpot

There is no official Squid Games app—not counting Netflix, of course—yet ESET’s Android malware researcher Lukas Stefanko tweeted that there are over 200 applications related to the series listed on the Play Store, and at least one of them was yet another piece of malicious software that slipped past Google’s.

Malware 131
article thumbnail

Top 5 Security Trends for CIOs

CIO Business Intelligence

A second, more pernicious risk is the fact that ChatGPT can write malware. Sometimes the malware has errors, but with simple repetition the hacker can generate multiple working versions of the code. Such polymorphic malware is particularly hard to detect, because it may be different from one attack to another.

Trends 317
article thumbnail

Cyber attackers turn to business disruption as primary attack objective

CTOvision

Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cybercriminals.

Malware 39