Remove Malware Remove Report Remove Social
article thumbnail

IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries

Tech Republic Security

Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat.

Malware 480
article thumbnail

The latest trends in the threat landscape

CIO Business Intelligence

Each quarter HP’s security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. Social engineering attacks Social engineering attacks, especially cybercriminals targeting enterprises with fake overdue invoices, continued to be a big endpoint threat in Q1.

Trends 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Throughout 2024, China-nexus adversaries demonstrated increasingly bold targeting, stealthier tactics, and more specialized operations, CrowdStrike stated in its 2025 Global Threat Report. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 330
article thumbnail

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Tech Republic Security

Identity-based and social engineering attacks still take center stage, according to the CrowdStrike 2024 Global Threat Report.

Report 500
article thumbnail

DeepSeek and AI-Generated Malware Pose New Danger for Cybersecurity

SecureWorld News

A recent report from Tenable highlights how DeepSeek R1, an open-source AI model, can generate rudimentary malware, including keyloggers and ransomware. While the AI-generated malware required manual debugging to function properly, its mere existence signals an urgent need for security teams to adapt their defenses.

Malware 114
article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO Business Intelligence

A human firewall is a collective effort of individuals within an organization that fights and wards off cybersecurity threats (such as phishing and ransomware), especially ones that use social engineering. In the past few months, infostealer malware has gained ground.

Firewall 246
article thumbnail

Russia's COLDRIVER Targets Western Entities with 'LOSTKEYS' Malware

SecureWorld News

Google's Threat Intelligence Group (GTIG) has identified a new malware strain, dubbed "LOSTKEYS," attributed to the Russian state-sponsored hacking group COLDRIVER. The introduction of LOSTKEYS signifies a strategic shift towards deploying malware for direct data exfiltration. Cedric Leighton , CNN Military Analyst; U.S.

Malware 95