Cyberattacks: Page 26


  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    SolarWinds threat actor targeted IT service providers in thousands of attacks, Microsoft says

    The campaign from the Russian nation-state threat actor Nobelium was caught early, but there were at least 14 compromises involving password spraying and phishing to gain access.

    By Samantha Schwartz • Oct. 25, 2021
  • A woman sitting by her laptop with a clothes rack in the background. SHe is behind a mirror wall.
    Image attribution tooltip

    stock.adobe.com/JacobLund

    Image attribution tooltip
    Sponsored by Cybersource

    How businesses are tackling fraud in a digital-first reality

    With digital transactions and eCommerce continuing to grow in volume, successfully taking on fraud will require businesses to explore and rely on new tools and technologies.

    Oct. 25, 2021
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Image attribution tooltip
    william thomas cain via Getty Images
    Image attribution tooltip

    Sinclair Broadcast becomes latest media group to face ransomware attack

    Researchers linked the incident that disrupted weekend broadcasts to Evil Corp., which used a ransomware strain associated with WastedLocker.

    By Updated Oct. 21, 2021
  • Suzanne Spaulding speaking during a Washington Post webcast 10/14/2021
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    The public needs to understand what's at stake with cyberattacks, DHS adviser says

    The Colonial Pipeline cyberattack was a "crisis of communication" between the company and consumers, Homeland Security Adviser Suzanne Spaulding said.

    By Samantha Schwartz • Oct. 15, 2021
  • Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Users have bad security habits. What can businesses do?

    "As strange as it sounds, in the case of a security incident in the enterprise, you can't blame the user," Bitdefender's Alex "Jay" Balan said. 

    By Samantha Schwartz • Oct. 14, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip
    Opinion

    How to secure the enterprise against REvil-style attacks

    There is no way to fully protect against advanced attacks such as zero-day vulnerabilities or nation-state threats — responding quickly is critical to minimizing damage.

    By Chris Silva • Oct. 12, 2021
  • Image attribution tooltip
    Brendan Smialowski / Stringer via Getty Images
    Image attribution tooltip

    War room preparation key to ransomware response, experts say

    Companies need to assemble stakeholders ahead of an attack and be ready for potential fallout from litigation, reputational risk and operations disruption. 

    By Oct. 11, 2021
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    Why CEOs become communication chiefs after a cyberattack

    When ransomware hit, the CEOs of Colonial Pipeline and Accellion paused their day-to-day duties. Their immediate new roles? Communication.

    By Samantha Schwartz • Oct. 7, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    REvil, DarkSide highlight surge in Q2 ransomware attacks: report

    The government sector saw more ransomware attacks, while financial services companies faced increased threats in the cloud, according to McAfee Enterprise research.

    By Oct. 4, 2021
  • Ransomware attacks put availability of medical devices at risk: FDA cyber chief

    Industry reached a "watershed moment" earlier this year when a device outage caused by malware endangered patient lives, said the acting director of cybersecurity at CDRH. 

    By Greg Slabodkin • Oct. 4, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft warns of new credential-stealing backdoor from SolarWinds threat actor

    The newly identified malware, called FoggyWeb, has been observed since April and is used to steal from compromised AD FS servers. 

    By Sept. 28, 2021
  • Image attribution tooltip
    Max Pixel
    Image attribution tooltip

    25% of providers saw mortality rates rise after ransomware attacks, survey finds

    This study of health delivery organizations is one of the first finding a direct impact on patient care. It comes roughly a year after a patient in Germany died as a result of delayed care following a ransomware attack.

    By Rebecca Pifer • Sept. 27, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Ripple effects from a cyber incident take a year to develop: report

    Organizations are likely to both generate and suffer the downstream consequences of cyber incidents because of the technological reliance companies have on one another.

    By Samantha Schwartz • Sept. 27, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Ransomware compromises customer data in farm co-op attack

    A Minnesota-based co-op became the second agricultural firm in recent days to be the target of ransomware, just weeks after the FBI and CISA warned of a wider threat to the industry.

    By Updated Sept. 24, 2021
  • Corn field and a house.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    BlackMatter gang targets Iowa agriculture cooperative in a test of critical infrastructure

    Iowa-based New Cooperative, one of the largest grain suppliers in the state, is facing a demand to pay $5.9 million in ransom.

    By Sept. 21, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    What to know about software bill of materials

    The Biden administration wants more transparency in the software supply chain. Will private industry join in?

    By Samantha Schwartz • Sept. 20, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Companies must develop operational plan for ransomware recovery

    In the face of more frequent and sophisticated attacks, companies need to identify their most critical assets and work to limit cyberattack fallout.

    By Sept. 17, 2021
  • 'Big game hunters': Ransomware groups target their perfect victim

    Research from KELA found U.S. companies with upwards of $100 million in revenue are favored targets.

    By Samantha Schwartz • Sept. 13, 2021
  • BlueVoyant ransomware ride along press release 1
    Image attribution tooltip
    Permission granted by Screenshot via BlueVoyant
    Image attribution tooltip

    What ransomware negotiations look like

    Fear can overwhelm the decision of whether to pay a ransom. But in negotiations, companies have to take a backseat.

    By Samantha Schwartz • Sept. 9, 2021
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    What's at stake in a credential stuffing attack

    Attackers gain a network foothold by using stolen credentials under the guise of an authenticated trusted employee or third party.

    By Sue Poremba • Sept. 1, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    Why a ban on ransom payments will not work

    Those most impacted by an attack are motivated to pay. In some cases, it's not the victim company but its customers who want service restored.

    By Samantha Schwartz • Aug. 27, 2021
  • Photo of health visual at cybersecurity HIMSS21
    Image attribution tooltip
    Rebecca Pifer/Cybersecurity Dive
    Image attribution tooltip

    Should healthcare organizations pay to settle a ransomware attack?

    The decision goes beyond finances: In healthcare, it's a moral judgement, too.  "I don't think there's a single yes or no," said Michael Coates, former Twitter CISO.

    By Rebecca Pifer • Aug. 13, 2021
  • Image attribution tooltip
    Dean Mouhtaropoulos via Getty Images
    Image attribution tooltip

    Criminal middlemen administer access to privileged accounts

    Ransomware attacks stem from a specialized division of labor selling stolen credentials and providing unauthorized access to the enterprise, according to an IntSights report. 

    By Aug. 12, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Researchers withholding vulnerabilities can create path to supply chain hacks

    Bug bounty programs incentivize researchers to fully develop vulnerabilities by offering higher payouts. But that can create risk for the enterprise, Corellium's Matt Tait said.

    By Samantha Schwartz • Aug. 5, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Initial access brokers sell a way in, widening the ransomware market

    The most popular network access points sold on the dark web offer insight for security teams to better understand what is most vulnerable to ransomware.

    By Samantha Schwartz • Aug. 2, 2021