Cyberattacks: Page 28


  • Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Pinning ransomware gangs is a game of 'whack-a-mole'

    Dismantling international criminal enterprises takes a combination of law enforcement, intelligence and allies. But gangs rebrand to evade detection.

    By Samantha Schwartz • May 26, 2021
  • Image attribution tooltip
    Dan Kitwood/Getty Images News via Getty Images
    Image attribution tooltip

    CNA Financial's reported $40M ransom payment likely a record

    The company, among the top-10 cyber insurance firms, had a cyber insurance policy, but losses could exceed its coverage.

    By Samantha Schwartz • May 21, 2021
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds CEO extends hack timeline, rethinks intern blame

    Investigators established the timeline after stumbling upon code that showed the attackers were embedded in the system since the beginning of 2019.

    By May 20, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Orbon Alija/ E+/Getty via Getty Images
    Image attribution tooltip

    WannaCry lesson still echoes: Patch

    The EternalBlue leak and unpatched Windows 7 operating systems created the perfect storm.

    By Samantha Schwartz • May 17, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    The fallout when OT companies lack confidence in IT security barriers

    While a controlled pipeline closure is preferred over one carried out by nefarious groups, the decision is up for debate in the security community.

    By Samantha Schwartz • May 14, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Ransomware fears escalate as Irish health service, Toshiba unit targeted

    "We are seeing more broad based cyber incidents from our adversaries who are growing more aggressive," said Brandon Wales, CISA acting director. 

    By May 14, 2021
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    Colonial Pipeline begins fuel delivery relaunch after ransomware attack

    While the company has not disclosed the attack vector, one expert said its quick recovery could be a post-breach success story. 

    By May 13, 2021
  • Image attribution tooltip
    Michael M. Santiago via Getty Images via Getty Images
    Image attribution tooltip

    Colonial Pipeline hack highlights grid disruption risks even with IT-focused cyberattack

    While the risk of malware migrating from IT to OT may be minimal, if it were to happen, the effects could be devastating, experts said. 

    By Robert Walton • May 13, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Colonial Pipeline disconnects OT systems to silo ransomware IT threat

    Anxiety is rising among corporate security officials concerned about the impact of ransomware among critical infrastructure providers.

    By May 12, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • Image attribution tooltip
    Tim Boyle/Staff via Getty Images
    Image attribution tooltip

    Colonial Pipeline attack embodies security risk to nation's critical infrastructure

    Security experts warned for years about attacks against critical infrastructure, but one analyst called this the most brazen yet.

    By Updated May 10, 2021
  • Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Cryptocurrency fuels ransomware payments. Without regulation, it could get worse

    The rapid ascent of crypto, like other emerging technologies before it, has far outpaced the federal government's ability to regulate it.

    By Samantha Schwartz • May 7, 2021
  • Robots assemble Ford vehicles at the Chicago Assembly Plant on June 24, 2019 in Chicago, Illinois.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Targeted industrial control systems add cautionary flag to cyber defense strategies

    A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference. 

    By May 6, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Passwordstate customers targeted with new round of phishing attacks

    The phishing email is asking customers to download a modified hotfix file, called Moserware.zip, from a content delivery network not controlled by Click Studios. 

    By April 29, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Cyberattack on Passwordstate tests confidence in password managers

    The supply chain attack is raising questions about how best to deploy and secure the tools as corporations face heightened threats across the globe.

    By April 27, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip

    Codecov hack — likened to SolarWinds — targets software supply chain

    Third-party actors were able to linger inside the software-testing firm’s environment for months, exfiltrating customer data.

    By Updated April 30, 2021
  • Capitol Hill in Washington, D.C.
    Image attribution tooltip
    Permission granted by E.A. Crunden
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds juggles stakeholders involved in response, recovery to level out business

    Reputation, risk issues and cross-sector cooperation demand a cohesive plan to ensure recovery and repair. It also helps to know the federal response.

    By Samantha Schwartz • April 22, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    25% of utilities exposed to SolarWinds hack amid growing ICS vulnerabilities, analysts say

    Security experts warn it may be too soon to tell whether follow-on activity has occurred.

    By Robert Walton • April 16, 2021
  • Image attribution tooltip
    Depositphotos
    Image attribution tooltip

    How IT can support security in the event of a cyberattack

    CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled. 

    By Jen A. Miller • April 13, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Payments industry faces potential 'destructive attacks,' Biden cybersecurity official warns

    Ransomware and infrastructure attacks are the biggest threats to the industry, a Biden administration cybersecurity official told the American Transaction Processors Coalition. 

    By Lynne Marek • April 9, 2021
  • 'Advanced cyberconflict' is nearing, researchers say

    Enterprises represent 35% of nation-state targets, whereas government or regulatory agencies are 12% of targets, according to the report.

    By Samantha Schwartz • April 8, 2021
  • A still of COVID-19 vaccine vials from Johnson & Johnson going through production
    Image attribution tooltip
    Permission granted by Johnson & Johnson
    Image attribution tooltip
    Deep Dive

    4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain

    Visibility technologies and real-time data provide one version of the truth in a rapidly built supply chain.

    By Deborah Abrams Kaplan • April 7, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Ransomware wins make threat actors push aside other malware

    While the FBI encourages a relationship with a victim organization, some businesses are hard pressed to involve law enforcement when fines could follow an attack.

    By Samantha Schwartz • April 7, 2021
  • Image attribution tooltip
    Daphne Howland/Cybersecurity Dive
    Image attribution tooltip

    Why SMBs miss out on the white-glove cyber insurance advantage

    Insurance companies spend less time with SMBs evaluating individual risk profiles, weakening a piece of the global cyber economy.

    By Samantha Schwartz • April 5, 2021
  • Molson Coors incident shines a light on industrial cyberattack vulnerabilities

    The international brewery continues to face delays and financial impacts amid a wave of attacks against manufacturing.

    By March 30, 2021