Cyberattacks: Page 24


  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Entrust acknowledges June cyberattack, remains tight-lipped on the details

    The cybersecurity vendor has yet to disclose how the incident occurred, the type of data stolen and if ransomware was involved.

    By July 28, 2022
  • The T-Mobile logo is displayed outside of a T-Mobile store on April 24, 2017 in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    T-Mobile agrees to $500M settlement for 2021 cyberattack

    The wireless carrier suffered a massive data breach in the summer of 2021, the fifth publicly acknowledged incident of its type in three years.

    By July 25, 2022
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    LockBit ransomware hitting network servers

    The latest tactic used to deploy the prolific malware allows threat actors to end processes, stop services and duplicate more quickly.

    By July 20, 2022
  • Florida International University campus
    Image attribution tooltip
    Permission granted by Florida International University
    Image attribution tooltip

    Ransomware attacks surge in education sector

    Colleges and universities are particularly challenged as repercussions of ransomware hit them harder and longer than other organizations.

    By July 14, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Threat actors favor brute force attacks to hit cloud services

    Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.

    By July 12, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images
    Image attribution tooltip

    Hospital ransomware concerns rise after payment vendor breach, North Korea threats

    A recently disclosed ransomware attack could have exposed patient data from more than 650 healthcare providers.

    By Rebecca Pifer • July 11, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Pricing pressures moderate as cyber insurance market begins to level out

    A surge in new buyers has begun to offset years of rising claims and higher premiums, according to data from global insurance firm Marsh.

    By July 1, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Ransomware groups shift tactics and objectives

    Malware can play a major or nonexistent role in ransomware attacks. Threat actors are often only in it for the money.

    By June 15, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    How and why ransomware responses go haywire

    A lack of fortitude and preparation on the communications front often puts enterprises at risk for greater harm.

    By June 13, 2022
  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images
    Image attribution tooltip

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can defenders keep up with the accelerated pace and scale of the cyber threat?

    By June 13, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    America's cyber chiefs have a long to-do list

    The federal government wants to lead by example and communicate the urgency of the moment. First, it needs to get its security affairs in order. 

    By June 9, 2022
  • Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Food supplier cyber risk spreads 1 year after JBS attack

    Ransomware attacks target common vulnerabilities like legacy OT systems and equipment that lacks modern security tools.

    By June 2, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Conti ransomware gang grows brash and flames out. What's next?

    The group's reported demise is likely a diversion. Members of the group still pose a significant ransom and data extortion threat to enterprises.

    By May 31, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • Image attribution tooltip
    Sean Rayford / Stringer via Getty Images
    Image attribution tooltip

    How the Colonial Pipeline attack instilled urgency in cybersecurity

    The federal government and private sector are still coming to terms with how to protect operational technology in an increasingly volatile threat environment.

    By May 17, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    US, allies blame Russia for Viasat cyberattack

    The Five Eyes and other EU authorities linked Russia to a series of web defacement, DDoS and destructive wiper attacks in the weeks leading up to the Ukraine invasion.

    By May 11, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Colonial Pipeline faces nearly $1M in penalties as federal regulator discloses violations

    The Transportation Department’s pipeline safety regulator scrutinized control room management, which may have contributed to the fuel disruptions from the 2021 ransomware attack.

    By May 6, 2022
  • A woman looking at her laptop holding a payment card.
    Image attribution tooltip
    Permission granted by Cybersource
    Image attribution tooltip
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • Image attribution tooltip
    David Dee Delgado via Getty Images
    Image attribution tooltip

    Microsoft blocks Russian cyberattacks linked to Ukraine war

    Strontium, a GRU-linked threat actor, targeted Ukraine media, foreign policy think tanks and government agencies in the U.S. and Europe.

    By April 8, 2022
  • A single opened padlock glows red among rows of closed blue padlocks.
    Image attribution tooltip
    JuSun via Getty Images
    Image attribution tooltip

    Okta denies security incident as Lapsus$ group goes on a spree

    The identity and access management firm believes screenshots connected with the breach are related to a January security incident that was contained.

    By March 22, 2022
  • Image attribution tooltip
    monsitj via Getty Images
    Image attribution tooltip
    Sponsored by Keeper Security

    Protecting against software supply chain attacks

    It's so important to protect the supply chain and ensure the companies you're working with are as committed to that protection as you are.  

    March 21, 2022
  • Image attribution tooltip
    Ian Forsyth / Stringer via Getty Images
    Image attribution tooltip

    Kronos ransomware attack raises questions of vendor liability

    A cyberattack with supply chain and legal consequences has stakeholders considering contract minutiae.

    By Lance Whitney • March 14, 2022
  • Image attribution tooltip
    william thomas cain via Getty Images
    Image attribution tooltip

    Sinclair losses mount as ransomware costs exceed insurance policy

    The group overhauled its internal security policies and named a board-level subcommittee as part of its ongoing attack recovery.

    By March 7, 2022
  • Sponsored by Keeper Security

    IT and tech firms hit hard by cyberattacks

      Lack of cybersecurity awareness among employees, especially regarding password security, also contributes to organizations' inability to comprehensively secure their networks.  

    March 7, 2022