Cyberattacks: Page 18


  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    Hackers target Pentagon contract site via compromised routers

    Research from Black Lotus Labs says the new activity aligns with recent state-linked campaigns, including Volt Typhoon.

    By Aug. 23, 2023
  • Hourglass projects a dollar sign as shadow against a black/grey background
    Image attribution tooltip
    LdF via Getty Images
    Image attribution tooltip

    Ransomware attack dwell times fall, pressuring companies to quickly respond

    The median dwell time for ransomware attacks hit a new low of five days in the first half of the year, according to Sophos.

    By Aug. 23, 2023
  • Cones of strawberry, vanilla and chocolate ice cream stick out of a glass jar with an ice cream scoop and spoons on a blurred counter background.
    Image attribution tooltip
    ahirao_photo via Getty Images
    Image attribution tooltip

    MOVEit attack spree makes Clop this summer’s most-prolific ransomware group

    The financially-motivated threat actor was responsible for one-third of all ransomware attacks in July, according to NCC Group and Flashpoint.

    By Aug. 22, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Cuba ransomware group exploits Veeam to hit critical infrastructure

    The threat actor also used malicious tools from previous campaigns, according to BlackBerry research.

    By Aug. 21, 2023
  • Petro-Canada has more than 1,500 retail locations across the nation of Canada.
    Image attribution tooltip
    Courtesy of Suncor
    Image attribution tooltip

    Suncor CEO says company mostly recovered from June cyberattack

    The incident was serious and not worth repeating, President and CEO Rich Kruger said. "I’d rather have a root canal than go through one of these attacks again.”

    By Aug. 17, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS customers’ most common security mistake

    All too often organizations are not doing least-privilege work with identity systems, AWS’ Mark Ryland told Cybersecurity Dive.

    By Aug. 16, 2023
  • The Dallas skyline
    Image attribution tooltip
    Pgiam via Getty Images
    Image attribution tooltip

    Dallas to pay vendors $8.6M for their ransomware recovery services

    The city paid vendors for hardware, software, incident response, consulting and monitoring in the wake of the attack.

    By Aug. 14, 2023
  • Wooden brown gavel on the table
    Image attribution tooltip
    Zolnierek via Getty Images
    Image attribution tooltip

    TIAA hit with class-action lawsuit over MOVEit data breach

    The suit claims the teachers’ retirement fund did not properly handle sensitive information compromised in the far-reaching cyberattack.

    By Anna Merod • Aug. 14, 2023
  • A big golden ticket on a top a glass with a variety of chocolate behind it
    Image attribution tooltip
    Permission granted by Specops
    Image attribution tooltip
    Sponsored by Specops Software

    Lock your doors to Kerberos golden ticket attacks

    Golden Ticket attacks hit the Key Distribution Service Account of the KDC, here's how to stop them.

    Aug. 14, 2023
  • Woman speaking on stage in front of a purple curtain in a black blazer and sparkly pants. There is also a podium that says "Black Hat USA 2023."
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    4 ways organizations can take back the advantage from attackers

    By reorienting systems defense around resilience, “we become more like attackers, we become nimble, empirical, curious,” Kelly Shortridge said at Black Hat USA 2023. 

    By Aug. 10, 2023
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Aug. 9, 2023
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat actors abuse valid accounts using manual tactics, CrowdStrike says

    The research underscores the outsized role and prevalence of legitimate credentials as an entry point for cyberattacks.

    By Aug. 8, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Ransomware attack on Prospect Medical Holdings impacts hospitals across 4 states

    Multiple hospitals in the system are still experiencing complications or closures as of Monday.

    By Aug. 7, 2023
  • Teenage students are walking up and down a staircase in a school hallway.
    Image attribution tooltip
    monkeybusinessimages via Getty Images
    Image attribution tooltip

    White House rolls out millions in funding to combat K-12 cyberattacks

    Federal officials are meeting with key administrators and technology providers to address a surge in ransomware and other malicious activity facing K-12 schools.

    By Aug. 7, 2023
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Poor access management besets most cloud compromises, Google says

    The prevalence of systems with weak access controls underscores a chronic security problem for organizations storing data in the cloud.

    By Aug. 3, 2023
  • Hot Topic hit by automated credential stuffing attack spree

    The U.S. retail chain doesn’t yet know what personal information was compromised or accessed by the threat actor.

    By Aug. 2, 2023
  • Tempur Sealy responding to cyberattack that disrupted operations

    The attack occurred almost two months after the company signed an agreement to acquire Mattress Firm, which will position it as one of the world's largest mattress manufacturers.

    By Aug. 1, 2023
  • Fredrick Lee, CISO at Reddit.
    Image attribution tooltip
    Permission granted by Reddit
    Image attribution tooltip

    Reddit names seasoned IT security leader as new CISO

    The hire of Fredrick “Flee” Lee comes about six months after hackers obtained company data and source code via a sophisticated phishing attack.

    By July 31, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Valid account credentials are behind most cyber intrusions, CISA finds

    The success rate of these techniques underscores the staying power of the most common methods threat actors use to gain initial access to targeted systems.

    By July 28, 2023
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Mandiant finds no evidence of data or cryptocurrency theft in JumpCloud attack

    The incident response firm only has insights into one of a handful of downstream victims, but the research suggests the damage may be limited.

    By July 26, 2023
  • A picture of a doctor's chest with a stethoscope around the neck.
    Image attribution tooltip
    Joe Raedle/Getty Images via Getty Images
    Image attribution tooltip

    Average cost of healthcare data breach reaches $11M, report finds

    The sector continues to be the most expensive industry for data breaches, with costs increasing 53% since 2020.

    By Emily Olsen • July 25, 2023
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Investigations are causing data breach costs to skyrocket, IBM finds

    Organizations are under mounting pressure to conduct more thorough investigations as the complexity of data breaches grow.

    By July 24, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Citrix zero day exposes critical infrastructure, one provider hit

    Researchers warn thousands of the Citrix NetScaler devices remain vulnerable to attack.

    By July 24, 2023
  • Activision
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft attackers may have data access beyond Outlook, researchers warn

    Microsoft is pushing back on claims by Wiz that compromised private encryption keys may have exposed SharePoint, Teams and OneDrive data to an APT actor.

    By July 21, 2023
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    JumpCloud cyberattack hits up to 5 customers, 10 devices

    Security researchers attributed the highly targeted attack to a cryptocurrency-seeking APT actor linked to the North Korean government.

    By July 20, 2023