article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation. While streamlining threat response, AIs rapid integration raises ethical concerns, especially in national security.

article thumbnail

DeepSeek and AI-Generated Malware Pose New Danger for Cybersecurity

SecureWorld News

A recent report from Tenable highlights how DeepSeek R1, an open-source AI model, can generate rudimentary malware, including keyloggers and ransomware. While the AI-generated malware required manual debugging to function properly, its mere existence signals an urgent need for security teams to adapt their defenses.

Malware 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 cyber threat report details growing trends

Tech Republic Security

SonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more. The post 2022 cyber threat report details growing trends appeared first on TechRepublic.

article thumbnail

News alert: CyTwist launches threat detection engine tuned to identify AI-driven malware in minutes

The Last Watchdog

Ramat Gan, Israel, January 7th, 2025, CyberNewswire — CyTwist , a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. Evasion: AI-generated threats mimic human behavior, complicating detection for security teams.

article thumbnail

The March Madness Cyber Threat

Adam Levin

March Madness brackets are a reliable delivery method for hackers to deliver malware. A single malware-infected file attachment can compromise several devices or an entire network. Discouraging the use of file attachments when they’re not strictly necessary helps prevent downloaded malware. Invest in security-based products.

article thumbnail

New Bumblebee malware loader increasingly adopted by cyber threat groups

Tech Republic Security

The post New Bumblebee malware loader increasingly adopted by cyber threat groups appeared first on TechRepublic. Conti, Quantum and Mountlocker were all linked to having used the new piece of software to inject systems with ransomware.

article thumbnail

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

Tech Republic Security

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia.