#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Panda Security | Breaking Cybersecurity News | The Hacker News

Category — Panda Security
Former Hacker Li Jun Donates to Panda Research Center

Former Hacker Li Jun Donates to Panda Research Center

Dec 16, 2010
In 2006, Li Jun, a Chinese man, was jailed for creating the 'Fujacks' worm. Recently, he appears to be attempting to rehabilitate his public image by making a donation to a panda research center in China. Li Jun was arrested in February 2007 and charged with writing and selling the "Panda Burning Joss Sticks" worm for approximately $13,000. Interestingly, Chinese police later convinced him to create a tool to repair the damage caused by the worm to infected users. The worm earned its nickname because it replaced file icons on infected PCs with the image of a stylized panda bear holding three joss sticks. Now, having been released from prison, Li Jun has reportedly donated 50,000 yuan ($7,500) to the Chengdu Research Giant Panda Breeding Center to support the care of a bear cub born there five months ago. China has a deep fascination with pandas, making this gesture a potential PR move. However, his team seemed to overextend this theme by claiming to the Xinhua news agen...
Panda Security Partners with Brazilian Army to Combat Cyberterrorism

Panda Security Partners with Brazilian Army to Combat Cyberterrorism

Nov 01, 2010
In an effort to combat cyberterrorism in Brazil, Panda Security has signed an agreement to support the training of the Brazilian Army's operational agents. These agents are engaged in the battle against internet-based crime and strategic intervention for cyber warfare. Panda Security will also provide endpoint protection for 37,500 computers belonging to the Army's Military Commands. This protection aims to counter malware, targeted attacks, and web threats. Panda's anti-malware lab, PandaLabs, will collaborate with the Army's Cyber-Warfare Communication Center to train individuals involved in the scientific and forensic investigation of cybercrime. The partnership will include the exchange of malware samples, with Panda providing rapid response and classification of malicious codes impacting Brazil. Brig. Gen. Antonino dos Santos Guerra Neto stated that Brazil has approximately 60,000 computers, experiencing an average of 100 probes daily across its 12 IT c...
Want to Grow Vulnerability Management into Exposure Management? Start Here!

Want to Grow Vulnerability Management into Exposure Management? Start Here!

Dec 05, 2024Attack Surface / Exposure Management
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the limitations of this approach have become increasingly evident.  At its core, Vulnerability Management processes remain essential for identifying and addressing weaknesses. But as time marches on and attack avenues evolve, this approach is beginning to show its age. In a recent report, How to Grow Vulnerability Management into Exposure Management (Gartner, How to Grow Vulnerability Management Into Exposure Management, 8 November 2024, Mitchell Schneider Et Al.), we believe Gartner® addresses this point precisely and demonstrates how organizations can – and must – shift from a vulnerability-centric strategy to a broader Exposure Management (EM) framework. We feel it's more than a worthwhile read an...
Expert Insights / Articles Videos
Cybersecurity Resources