Cyberattacks


  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Palo Alto Networks pushes back as Shadowserver spots 2K of its firewalls exploited

    The security vendor maintains only a limited number of customers’ firewalls have been exploited by a zero-day it patched earlier this week.

    By Nov. 22, 2024
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Attackers wield password-spray attacks to zero-in on targets, research finds

    The highly effective brute-force attack method requires little effort, Trellix said. Organizations with weak password policies or no MFA are especially at risk.

    By Nov. 20, 2024
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Palo Alto Networks customers grapple with another actively exploited zero-day

    The security vendor warned of an unconfirmed vulnerability in PAN-OS earlier this month. A CVE entry and patch came 10 days later.

    By Nov. 19, 2024
  • Abstract black and white monochrome art with surreal funnel.
    Image attribution tooltip
    Philipp Tur/Getty Images Plus via Getty Images
    Image attribution tooltip

    AI training vendor iLearningEngines discloses cyberattack in wake of SEC probe

    The company said an attacker stole data, misdirected a $250,000 wire payment and deleted emails.

    By Nov. 19, 2024
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks’ customer migration tool hit by trio of CVE exploits

    CISA warned of two critical and actively exploited vulnerabilities in Expedition one week after another CVE came under active exploitation in the same product.

    By Nov. 15, 2024
  • Telecom network above a city
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Feds find ‘broad and significant’ China espionage campaign in US telecom networks

    The FBI and CISA warned the nation-state affiliated malicious activities are extensive and include the theft of sensitive call records and court-ordered information.

    By Nov. 14, 2024
  • A Cargill sign is seen at the entrance of a parking lot where cars sit.
    Image attribution tooltip
    Spencer Tirey via Getty Images
    Image attribution tooltip

    5th Circuit dismisses Cargill employee’s Kronos hack, discrimination claims

    The decision is also a victory for UKG, whom the employee sued separately for privacy violation allegations stemming from a 2021 ransomware attack.

    By Ryan Golden • Nov. 14, 2024
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Zero-days from top security vendors were most exploited CVEs in 2023

    The top five vulnerabilities exploited by attackers last year were found in security gear from Citrix, Cisco and Fortinet, the Five Eyes’ cyber agencies found.

    By Nov. 13, 2024
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    Critical Veeam CVE targeted by new ransomware variant

    Multiple ransomware variants are now targeting the CVE, which has a CVSS of 9.8. For customers, the risk of exploitation is only increasing.

    By Nov. 12, 2024
  • A screenshot of a website outage.
    Image attribution tooltip
    Retrieved from Hannaford on November 11, 2024
    Image attribution tooltip

    Grocery giant Ahold Delhaize’s US operations disrupted by cyberattack

    The parent company said the disruption forced it to take certain systems offline and affected some pharmacies and e-commerce services.

    By Catherine Douglas Moran , Sam Silverstein • Nov. 11, 2024
  • Pumpjack (oil derrick) and refinery plant in West Texas.
    Image attribution tooltip
    dszc via Getty Images
    Image attribution tooltip

    Newpark Resources discloses October ransomware attack

    The incident occurred just two months after an attack against oilfield services giant Halliburton.

    By Nov. 11, 2024
  • Halliburton offices in Houston, Texas. The company is recovering from a an August cyberattack that temporarily disrupted certain operations.
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    Halliburton incurs about $35M in expenses related to August cyberattack

    The company said the intrusion forced it to delay billing and collections, but the impact is not considered material.

    By Nov. 8, 2024
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Attackers target Palo Alto Networks’ customer migration tool

    An actively exploited vulnerability in Expedition allows attackers to achieve admin account takeover. The product reaches end of life in January.

    By Nov. 8, 2024
  • a close up of a computer chip implanted on a silicon board
    Image attribution tooltip
    SweetBunFactory via Getty Images
    Image attribution tooltip

    Microchip Technology reports $21.4M expense from August cyberattack

    The chipmaker said the financial impact from the attack was immaterial and largely linked to unscheduled factory outages.

    By Nov. 7, 2024
  • A daytime shot of Columbus, Ohio, with a bridge, river and green space in the foreground. Tall buildings dot the background.
    Image attribution tooltip
    Sean Reid via Getty Images
    Image attribution tooltip

    Columbus, Ohio confirms July ransomware attack compromised data of 500K people

    The city notified half a million people their personal information was at risk following the attack it attributed to a foreign threat actor.

    By Nov. 6, 2024
  • security operations center
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Cyberattacks hit 1 in 3 SMBs last year

    Cyber woes for SMBs are exacerbated by a lack of resources to enact advanced security measures, Microsoft Security said in a report.

    By Nov. 5, 2024
  • A facade of a Schneider Electric building.
    Image attribution tooltip
    Permission granted by Schneider Electric
    Image attribution tooltip

    Schneider Electric investigating cyber intrusion after threat actor gains access to platform

    The French multinational company has been a previous target of ransomware groups.

    By Nov. 5, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA warns of foreign threat group launching spearphishing campaign using malicious RDP files

    Midnight Blizzard has targeted more than 100 organizations across government, IT and academia, in some cases impersonating Microsoft employees.

    By Nov. 1, 2024
  • MoneyGram phone sits on store counter.
    Image attribution tooltip
    Retrieved from Lynne Marek on March 04, 2022
    Image attribution tooltip

    MoneyGram replaces CEO, naming former Walmart executive to the role

    The money transfer company named the new CEO just weeks after a cyberattack led to a systemwide shutdown of its services for several days.

    By Lynne Marek • Oct. 31, 2024
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Fortinet finds more malicious IPs linked to widely exploited zero-day

    The cybersecurity vendor said the additional indicators of compromise don’t reflect any major changes. Researchers warn thousands of devices remain exposed.

    By Oct. 31, 2024
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Cisco warns actively exploited CVE can lead to DoS attacks against VPN services

    The company warned the threat activity is linked to previously disclosed brute-force attacks beginning in March.

    By Oct. 28, 2024
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Feds probe China-linked attacks on US telecom networks

    The government’s public acknowledgment of the China-linked attacks follows a series of warnings about a broad and successful campaign to hack U.S. critical infrastructure.

    By Oct. 28, 2024
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    SonicWall firewalls the common access point in spreading ransomware campaign

    Arctic Wolf Labs researchers said SonicWall firewalls were the initial access point for at least 30 ransomware attacks since August.

    By Oct. 25, 2024
  • UnitedHealth Group office
    Image attribution tooltip
    Courtesy of UnitedHealth Group
    Image attribution tooltip

    Change Healthcare data breach officially affects 100M people

    The breach is the largest ever reported to a portal managed by federal regulators.

    By Emily Olsen • Oct. 25, 2024
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Fortinet zero-day attack spree hits at least 50 customers

    Active exploits of a critical vulnerability in FortiManager began in late June, Mandiant said. Firewall credentials and configuration data have been stolen.

    By Oct. 24, 2024