Cyberattacks: Page 25


  • High Voltage Electric Power Lines At Sunset
    Image attribution tooltip
    imaginima via Getty Images
    Image attribution tooltip

    Cyber risk to US utilities seen as limited as Biden sets red line

    Critical infrastructure is on high alert, but — at least for now — the conflict in Europe could signal a lull in utility ransomware attacks.

    By Robert Walton • March 4, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Ukraine war tests cyber insurance exclusions

    Enterprise customers should expect higher premiums and more restrictive underwriting criteria, though a recent court victory may force insurers to honor wartime claims.

    By March 3, 2022
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Chris McGrath via Getty Images
    Image attribution tooltip

    New wiper, worm attacks emerge in Ukraine targeting government and industry

    CISA shared indicators of compromise Thursday, months after the malware strains emerged. 

    By Updated April 29, 2022
  • Photo of a building with a sign that reads "Nvidia."
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Cyberattack on Nvidia results in data leak, credential theft

    The incident took place as Russia's war in Ukraine unfolds against a backdrop of U.S. warnings to protect critical industries.

    By , Updated March 1, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Botnets, data wiping malware spread as Ukraine incursion begins

    A new variant of Cyclops Blink is now targeting Asus routers. 

    By Updated March 18, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    US links Russia to Ukraine DDoS attacks

    Administration officials said there are no specific or credible cyberthreats to the U.S., but private sector organizations should report unusual activity. 

    By , Feb. 18, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    With K-12 cyberattacks expected to worsen in 2022, what can districts do?

    Collaboration with local, federal and ed tech leaders to find solutions may help address K-12's growing vulnerabilities to cyberattacks.

    By Anna Merod • Jan. 26, 2022
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Google Drive, OneDrive top cloud apps for malware delivery: report

    Netskope's findings are based on blocked malware, so the hacker's attempts to get a user to open a malicious download were initially successful. 

    By Samantha Schwartz • Jan. 12, 2022
  • A laptop used for hybrid work.
    Image attribution tooltip
    rfranca via Getty Images
    Image attribution tooltip

    Phishing lures await in Google Docs comments

    Email addresses are hidden when someone mentions a user in a comment, so the human instinct to question the legitimacy of the notification decreases. 

    By Samantha Schwartz • Jan. 10, 2022
  • Close up of a large conference table with chairs in a meeting room in the high-rise office building
    Image attribution tooltip
    peterschreiber.media via Getty Images
    Image attribution tooltip

    C-suite leaders are confident in ransomware protections, despite more attacks

    While it's important for non-IT and security leaders to have buy-in, CISOs have the responsibility to level with their C-suite counterparts on the true threat of ransomware, (ISC)² research shows.

    By Samantha Schwartz • Jan. 5, 2022
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    One year later: Has SolarWinds changed how industry builds software?

    The SolarWinds hack caused government and industry leaders to rethink how software is made and secured, giving rise to close scrutiny of the software supply chain.

    By Samantha Schwartz • Dec. 14, 2021
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    Cyberattacks keep targeting colleges. How can they protect themselves?

    Higher ed's sprawling systems mean cybersecurity doesn't come easy — or cheap. But smart strategies and thinking through risk can go a long way.

    By Liz Farmer • Dec. 9, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    A month after 'malicious' cyberattack, a small Colorado utility still doesn't have all systems back online

    Delta-Montrose Electric Association is still working to restore its payment and billing systems. Security experts say the recovery time points to a need for better backups.

    By Robert Walton • Dec. 7, 2021
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    Cuba ransomware targets critical infrastructure, steals $44M in payments

    The threat actors compromised at least 49 organizations across the financial, government, healthcare, manufacturing, and information technology sectors. 

    By Samantha Schwartz • Dec. 6, 2021
  • A sign is posted in front of a Marriott hotel.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Marriott is still covering — and recovering — expenses from its 2018 data breach

    The hotel has seen an increase in renewal costs for its cyber insurance "over the last several years," the company said. 

    By Samantha Schwartz • Dec. 1, 2021
  • Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    Majority of US retailers, critical infrastructure unscathed after holiday cyber warnings

    Industry averted a major cyber incident amid warnings from the FBI and CISA, though home furnishings retailer Ikea fought to contain a sophisticated phishing attack.

    By Nov. 30, 2021
  • A single opened padlock glows red among rows of closed blue padlocks.
    Image attribution tooltip
    JuSun via Getty Images
    Image attribution tooltip

    2 community colleges close to recover from cyberattacks

    Lewis and Clark Community College and Butler County Community College are closing their campuses as they restore their servers and systems.

    By Natalie Schwartz • Nov. 30, 2021
  • A person holds a credit card in front of a laptop computer.
    Image attribution tooltip
    Poike via Getty Images
    Image attribution tooltip

    DDoS threats linger as peak holiday shopping begins

    Slow or crashing websites can stem from failure to prepare, an unexpected bug or a denial-of-service attack, which have grown more severe this year, Cloudflare's Patrick Donahue said. 

    By Samantha Schwartz • Nov. 24, 2021
  • GoDaddy banner hangs outside of the New York Stock Exchange
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    GoDaddy breach raises questions about how to secure identity in the enterprise

    More than one million current and former WordPress customers had their data exposed by the attack, which could expose organizations to downstream phishing attacks and ransomware, security researchers said.

    By Updated Nov. 24, 2021
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    Recovering ransom payments could become routine for law enforcement

    Backed by blockchain analysts and crypto-tracers, law enforcement agencies want to become more proficient in seizing ransomware-related funds.

    By Samantha Schwartz • Nov. 23, 2021
  • The U.S Capitol Rotunda is in front of a designed background of $100 bills.
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    FBI justifies its decision to withhold Kaseya decryptor

    The law enforcement agency prioritized the long-term benefits of a delay over the immediate decryption key release.

    By Samantha Schwartz • Nov. 17, 2021
  • Image attribution tooltip
    william thomas cain via Getty Images
    Image attribution tooltip

    Sinclair Broadcast still assessing financial impact of ransomware attack

    While the news provider maintains cyber insurance to cover losses related to security risk and business interruption, such policies may not be enough to cover the losses, President and CEO Chris Ripley said.

    By Nov. 4, 2021
  • Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    SolarWinds threat actor targets cloud services, Microsoft 365 mailboxes

    The threat actor is using a tactic called EWS impersonation to target mailboxes in Microsoft 365 and is also using cloud service providers to target end users, Mandiant researchers said. 

    By Nov. 1, 2021
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    The most 'anxiety-inducing' cyberattacks of 2021 for IT and security

    "PrintNightmare is just like the flipping gift that keeps on giving," Jason Slagle of CNWR IT Consultants said. "You can get popped by it, and then literally every week there's some sort of update." 

    By Samantha Schwartz • Oct. 29, 2021
  • Image attribution tooltip
    Dan Kitwood / Staff via Getty Images
    Image attribution tooltip

    Identity crisis: Why ransomware groups rebrand — and disappear

    Criminals are not known for telling the truth, but what they say is usually the only explanation for a disappearance. Even if it is a lie.

    By Samantha Schwartz • Oct. 28, 2021