Remove industry-news insider-threat-research
article thumbnail

Aquatic Panda found stealing industrial intelligence and military secrets

CyberSecurity Insiders

Cybersecurity researchers from CrowdStrike have discovered that China funded hacking group Aquatic Panda was busy indulging in spying and espionage activities related to industrial intelligence and military secrets.

article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Teslas have plenty of vulnerabilities, as cybersecurity researchers have recently discovered. While Teslas aren’t the typical business IoT device, their connection to the internet makes them a cyber threat as much as your business’s other IoT technology. But as demonstrated last week, the vehicles are still a hazard.

Hacking 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ChatGPT Makes Waves Inside and Outside of the Tech Industry

Security Boulevard

New and Noteworthy: ChatGPT Makes Waves Inside and Outside of the Tech Industry Since it was made publicly available in December, ChatGPT has prompted all sorts of reactions from both inside and outside technology circles. In other fields, ChatGPT is being met with some concern.

Malware 125
article thumbnail

Top Cybersecurity Podcasts

CyberSecurity Insiders

Keeping up with the latest cybersecurity industry news and information can be a challenge all on its own. The cybersecurity experts featured below provide timely industry updates and other insights via engaging conversational platforms. Security Weekly News – Security Weekly. Covering weekly tech news with comedy.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Acohido to share his ideas about the current cyber threat landscape, the biggest threats for businesses today, the role of AI and machine learning in cyberattacks and cyberdefence, and the most effective methods for companies to protect themselves. Erin: How has the cyber threat landscape evolved since you first got into cybersecurity?

article thumbnail

US Government defense data stolen by Malware

CyberSecurity Insiders

Information is out that an advanced persistent threat group has reportedly stolen data from the US Defense servers with the help of CovalentStealer Malware. And news is out that the information steal was taking place from the past 10 months, with the initial access got Microsoft Exchange Servers from January last year.

article thumbnail

Leaked Documents Reveal China's State-Sponsored Hacking Operations

SecureWorld News

As KrebsonSecurity reports , the documents illustrate "how Chinese government agencies increasingly are contracting out foreign espionage campaigns to the nation's burgeoning and highly competitive cybersecurity industry." The reason for the leak remains unknown, but disgruntled insiders are a prime suspect.

Hacking 82