Cyberattacks


  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    Ransomware gangs increasingly brandish EDR bypass tools

    Custom tool developed by RansomHub, dubbed “EDRKillShifter,” is used by several other rival ransomware gangs.

    By March 27, 2025
  • Microsoft building with logo
    Image attribution tooltip
    HJBC via Getty Images
    Image attribution tooltip

    Russian threat actor weaponized Microsoft Management Console flaw

    A threat actor known as “EncryptHub” began exploiting the zero-day vulnerability before it was patched earlier this month.

    By Elizabeth Montalbano, Contributing Reporter • Updated March 26, 2025
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Critical Apache Tomcat RCE vulnerability exploited

    Attack attempts via CVE-2025-24813 are underway, but successful attacks require specific, non-default configurations, according to GreyNoise.

    By March 24, 2025
  • Coinbase
    Image attribution tooltip
    Courtesy of Coinbase
    Image attribution tooltip

    Coinbase originally targeted during GitHub Action supply chain attack

    Researchers from Palo Alto Networks said the hackers likely planned to leverage an open source project of the company for additional attacks.

    By March 21, 2025
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Medusa ransomware using malicious driver as EDR killer

    "ABYSSWORKER" imitates a CrowdStrike Falcon driver.

    By March 21, 2025
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    11 nation-state groups exploit unpatched Microsoft zero-day

    The tech giant has yet to address a vulnerability that allows for malicious payloads to be delivered via Windows shortcut files and has been under active attack for eight years.

    By Elizabeth Montalbano, Contributing Reporter • March 19, 2025
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    RansomHub using FakeUpdates scheme to attack government sector

    The ransomware gang is collaborating with SocGholish, an extensive malware operation that employs compromised websites and fake browser updates.

    By March 18, 2025
  • A tech worker eviews code on a computer screen
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Supply chain attack against GitHub Action triggers massive exposure of secrets

    The incident highlights ongoing security concerns in the software supply chain.

    By March 17, 2025
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    Black Basta uses brute-forcing tool to attack edge devices

    The ransomware gang developed an automated framework to guess weak and reused passwords on VPNs and firewalls.

    By March 17, 2025
  • A bronze depiction of ancient god Medusa with snakes in her hair
    Image attribution tooltip
    Paul Campbell via Getty Images
    Image attribution tooltip

    Medusa ransomware slams critical infrastructure organizations

    The ransomware-as-a-service gang tallied more than 300 victims in industries such as healthcare, manufacturing and technology.

    By March 13, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA: 3 Ivanti endpoint vulnerabilities exploited in the wild

    Researchers last month published a proof-of-concept exploit for the critical flaws in Endpoint Manager.

    By March 11, 2025
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Critical PHP vulnerability under widespread cyberattack

    Telemetry data shows spikes in exploits of CVE-2024-4577 across several countries in recent months.

    By March 10, 2025
  • Image of healthcare equipment
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Cobalt Strike takedown effort cuts cracked versions by 80%

    Fortra, Microsoft and Health-ISAC partnership reduced unauthorized copies of red team tool over the last two years.

    By March 7, 2025
  • Technician services a cloud server.
    Image attribution tooltip
    anandaBGD via Getty Images
    Image attribution tooltip

    37K+ VMware ESXi instances vulnerable to critical zero-day

    Some customers have been unable to download the patches for three VMware zero-day vulnerabilities due to an issue with the Broadcom Support Portal.

    By March 6, 2025
  • Technician in server hub doing face palm gesture, trying to protect hardware from hacker stealing information
    Image attribution tooltip
    Dragos Condrea via Getty Images
    Image attribution tooltip

    Cyberattacks targeting IT vendors intensify, causing bigger losses

    Ransomware criminals are on the hunt for prime targets that can yield bigger payouts, according to cyber risk management firm Resilience.

    By Alexei Alexis • March 6, 2025
  • A sign is posted in front of a Broadcom office on December 12, 2024 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Broadcom urges customers to patch 3 zero-day VMware flaws

    Cyberattackers with administrative access are actively exploiting vulnerabilities in ESXi, Workstation and Fusion products.

    By Elizabeth Montalbano, Contributing Reporter • March 5, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    More than 86K IoT devices compromised by fast-growing Eleven11 botnet

    The Iran-linked botnet has a large presence in the U.S. and is targeting telecom and other firms with DDoS attacks.

    By March 4, 2025
  • legal role in data incident or breach
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Rubrik discloses server breach, compromise of ‘access information’

    The data security and backup vendor said it found no evidence that the stolen data was used by cyber threat actors.

    By March 4, 2025
  • words zero day highlighted in code
    Image attribution tooltip
    JUN LI via Getty Images
    Image attribution tooltip

    Microsoft-signed driver used in ransomware attacks

    Threat actors are exploiting a privilege escalation flaw in Paragon Partition Manager for “bring your own vulnerable driver” (BYOVD) attacks.

    By March 3, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises investigating ransomware claim, data leak threat

    The newspaper chain previously confirmed the attack would likely have a material impact on its financial condition.

    By March 3, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Leaked ransomware chat logs reveal Black Basta’s targeted CVEs

    Cybercrime group focused on Microsoft vulnerabilities as well as flaws in network edge devices and communications software.

    By Feb. 27, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

    GreyNoise observed exploitation of CVE-2018-0171, which Cisco Talos researchers said was used in a recent attack by the China-backed threat group.

    By Feb. 25, 2025
  • password to access personal user data, cybersecurity concept
    Image attribution tooltip

    stock.adobe.com/Song_about_summer

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Is your browser ground zero for cyber-attacks?

    Organizations must not overlook web browser threats – or the new technologies that can defeat them.

    By Anupam Upadhyaya, Vice President Product Management – Prisma SASE at Palo Alto Networks • Feb. 24, 2025
  • Data Breach Button on Computer Keyboard
    Image attribution tooltip
    GOCMEN via Getty Images
    Image attribution tooltip

    Tech investment firm Insight Partners discloses data breach

    The company holds equity in several major technology companies, including Wiz and Kaseya.

    By Feb. 19, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Lee Enterprises says cyberattack will likely have material impact

    The newspaper chain said attackers encrypted critical applications and impacted billing, payments and print distribution.

    By Feb. 18, 2025