Cyberattacks: Page 26
-
Malicious OAuth applications used to control Exchange tenants in sweepstakes scam
Microsoft researchers said a threat actor launched credential-stuffing attacks against high-risk accounts that failed to deploy multifactor authentication.
By David Jones • Sept. 23, 2022 -
Ransom demand escalates fallout from Los Angeles schools cyberattack
The Los Angeles school district hasn’t responded to the demand, following the advice of federal authorities. The stakes are high as sensitive data may hang in the balance.
By Matt Kapko • Sept. 21, 2022 -
American Airlines targeted by threat actor in July data incident
The airline has notified customers about the potential release of personal data, but said there is no evidence of the data being misused.
By David Jones • Sept. 20, 2022 -
Uber details how it got hacked, claims limited damage
While there's no evidence the rideshare company's codebase was altered, the attacker did gain access to Slack, vulnerability reports and financial data.
By Matt Kapko • Sept. 19, 2022 -
Threat actor breaches many of Uber’s critical systems
After duping an employee into providing their password, the attacker claims it gained access to Uber’s cloud infrastructure and sensitive data.
By Matt Kapko • Sept. 16, 2022 -
Cloud security pros expect elevated risk for serious data breaches
Just one out of five cybersecurity and engineering professionals escaped the previous year without incident.
By Matt Kapko • Sept. 14, 2022 -
Healthcare cyberattacks led to worse patient care, increased mortality, study finds
Delayed procedures and tests were the most commonly reported consequences of healthcare cyberattacks, according to a study from the Ponemon Institute and Proofpoint.
By Hailey Mensik • Sept. 13, 2022 -
Energy providers hit by North Korea-linked Lazarus exploiting Log4j VMware vulnerabilities
Cisco Talos researchers observed the advanced persistent threat actor infiltrating networks during a six-month campaign.
By Matt Kapko • Sept. 13, 2022 -
Sponsored by Delinea
How do I monitor privileged accounts?
Are you monitoring your privileged accounts? Start here to shield your organization against attacks.
By Tony Goulding • Sept. 12, 2022 -
Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
CISA announces RFI for critical infrastructure cyber reporting mandate
The agency plans to publish the information request in the Federal Register on Monday and will kick off a national listening tour.
By David Jones • Sept. 9, 2022 -
Website of medical device sales form: https://spwindustrial.com/baxter-sigma-spectrum-infusion-pump-s-w-ver-8-with-dual-antenna-wireless-batt/?gclid=Cj0KCQjwpeaYBhDXARIsAEzItbFttwA55ImqoesvcmNYfm6od_td4SGgOeNOqFOQohCiU_ci1yN-oHsaAqiFEALw_wcB
CISA issues advisory after vulnerabilities found on Baxter infusion pumps
The weaknesses could allow attackers to access WiFi data and make the device unavailable.
By Nick Paul Taylor • Updated Sept. 8, 2022 -
Healthcare fintechs targeted by cybercriminals
Cybersecurity professionals say healthcare payments processing firms are particularly vulnerable to information technology breaches and ransomware attacks.
By Joe Burns • Sept. 8, 2022 -
Los Angeles school district hit by ransomware attack
Schools reopened after the holiday weekend but many IT systems remain inaccessible. A districtwide password reset is underway.
By Matt Kapko • Sept. 6, 2022 -
Email hacking scheme leads to attempted theft of $13M from Pennsylvania school district
Local government agencies intercepted and recovered $10.3 million in funds stolen from Chester Upland School District.
By Anna Merod • Sept. 6, 2022 -
Most organizations remain unprepared for ransomware attacks
Too many organizations are failing to meet cybersecurity demands. Ransomware attacks abound and humans are still the weakest link.
By Matt Kapko • Sept. 6, 2022 -
PyPI contributors targeted by JuiceLedger in latest attack against open source
The supply chain attack represents a potential risk to organizations using open source, researchers from SentinelOne and Checkmarx say.
By David Jones • Sept. 6, 2022 -
Okta CEO pushes for passwordless future in wake of phishing attacks
Customers that rely on passwords and log-in pages are putting their organizations at greater risk of attack, Todd McKinnon told analysts.
By Matt Kapko • Sept. 2, 2022 -
Okta entangled by Twilio phishing attack
The threat actor initiated one-time password requests as they searched dozens of phone numbers linked to a single targeted organization.
By Matt Kapko • Aug. 30, 2022 -
Twilio discloses more victims as phishing attack effects cascade
The communications and identity authentication provider said it has discovered 163 victims thus far.
By Matt Kapko • Aug. 29, 2022 -
Sponsored by Delinea
How does Privileged Access Management work?
The model is a framework to help you set the right PAM foundation and get your organization on the PAM journey, now and in the future.
Aug. 29, 2022 -
Tips for how to safeguard against third-party attacks
Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk.
By Matt Kapko • Aug. 25, 2022 -
Ransomware attack surges tied to crypto spikes
Not every ransomware attempt leads to a successful attack. But with more attempts comes more potential damage.
By Matt Kapko • Aug. 24, 2022 -
Credential stuffing hammers US businesses as account data for sale in bulk
Media companies, retailers, restaurant groups and food delivery services are at heightened risk, the FBI said.
By Matt Kapko • Aug. 23, 2022 -
Third-party attacks spike as attackers target software connections
Every third-party tool and partnership is a potential path for attack and an opportunity to exploit human behavior. The risks spread far and wide.
By Matt Kapko • Aug. 22, 2022 -
LockBit ransomware group claims responsibility for Entrust attack
The prolific ransomware gang threatened to publish data stolen during the attack.
By Matt Kapko • Aug. 19, 2022