Cyberattacks: Page 4


  • 3d arrows and percent sign on the background of a building under construction and US banknotes. The concept of growth of financial and mortgage rates, profits in the construction industry.
    Image attribution tooltip
    Lari Bat
    Image attribution tooltip

    LoanDepot reports net loss as cyber-related settlement hit Q2 financial results

    The company disclosed $27 million in charges primarily related to a settlement deal in connection with a class action lawsuit.

    By Aug. 9, 2024
  • A brick building with a sign that says "Henry Schein Inc."
    Image attribution tooltip
    Bruce Bennett via Getty Images
    Image attribution tooltip

    Henry Schein’s slow recovery from cyber incident hits Q2 results

    William Blair analysts said the “lingering impacts from the cyberattack are somewhat surprising.”

    By Nick Paul Taylor • Aug. 8, 2024
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Black Hat logo on display above Michelob Ultra Arena in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike snafu was a ‘dress rehearsal’ for critical infrastructure disruptions, CISA director says

    Despite the disruption, Jen Easterly said the outage was a "useful exercise" to determine the resiliency of critical infrastructure organizations.

    By Aug. 8, 2024
  • Deep Dive

    Are cybersecurity professionals OK?

    Absorbing the impacts of cyberattacks takes a personal toll on defenders. Separating the evil they see from all that’s good in the world doesn’t always come easy.

    By Aug. 7, 2024
  • Abstract black and white monochrome art with surreal funnel.
    Image attribution tooltip
    Philipp Tur/Getty Images Plus via Getty Images
    Image attribution tooltip

    Ransomware swells despite collective push to curb attacks

    Rapid7 researchers observed more than 2,570 ransomware attacks in the first half of 2024. That’s the equivalent of 14 publicly claimed attacks per day, on average.

    By Aug. 6, 2024
  • Sponsored by Palo Alto Networks

    Inside the NOC used to defend this year’s Black Hat

    With the power of security operations automation, we are freed up from the more mundane tasks and can examine more complex threat patterns to protect the conference.

    By James Holland, Senior Solutions Architect, Palo Alto Networks • Aug. 5, 2024
  • People walk past a Microsoft Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft confirms Azure, 365 outage linked to DDoS attack

    The company said its own response to the outage may have made the impact worse.

    By July 31, 2024
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip

    Some companies pay ransomware attackers multiple times, survey finds

    Even after paying a ransom, more than a third of companies either did not receive the decryption keys or were given corrupted keys, Semperis found.

    By Justin Bachman • July 31, 2024
  • Aerial view of sewage treatment plant
    Image attribution tooltip
    xijian via Getty Images
    Image attribution tooltip
    Sponsored by Rockwell Automation

    Water systems under siege: How CISOs can protect critical infrastructure from cyberthreats

    As regulatory oversight evolves, most CISOs are focused on modernizing and improving OT cybersecurity.

    July 29, 2024
  • The hospital instructor stands near the nurse to show her how to navigate the computer to insert notes.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Healthcare is an ‘easy victim’ for ransomware attacks. How hospitals can mitigate the damage.

    Limited resources in a highly connected ecosystem can make hospitals vulnerable, but planning ahead and implementing key protections could help thwart attacks.

    By Emily Olsen • July 19, 2024
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    Majority of SEC civil fraud case against SolarWinds dismissed, but core remains

    The court ruling related to claims leading up to and immediately following the 2020 Sunburst supply chain hack.

    By Updated July 18, 2024
  • UnitedHealth Group office
    Image attribution tooltip
    Courtesy of UnitedHealth Group
    Image attribution tooltip

    UnitedHealth’s cyberattack response costs to surpass $2.3B this year

    The healthcare giant’s new estimate is roughly $1 billion higher than previous forecasts as the cyberattack on subsidiary Change Healthcare continues to hamper its profit outlook.

    By Rebecca Pifer • July 17, 2024
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Weak credentials behind nearly half of all cloud-based attacks, research finds

    Credential mismanagement was the top initial access vector for cloud environment attacks during the first half of 2024, a Google Cloud report found.

    By July 17, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Ransomware leak site posts jumped 20% in Q2

    Threat groups claimed attacks on 1,237 organizations during the quarter, marking an increase from Q1. U.S.-based businesses accounted for more than half of all victims, Reliaquest found.

    By July 16, 2024
  • Vehicles for sale at an AutoNation car dealership.
    Image attribution tooltip
    Mario Tama/Staff/Getty Images News via Getty Images
    Image attribution tooltip

    AutoNation warns CDK cyberattack will dent quarterly earnings

    The major North American car dealership estimates the attack will lead to a $1.50 per-share earnings impact.

    By July 15, 2024
  • Advance Auto Parts distribution center in Kutztown, Pennsylvania
    Image attribution tooltip
    Permission granted by Advance Auto Parts
    Image attribution tooltip

    Snowflake-linked attack on Advance Auto Parts exposes 2.3 million people

    One of the few customers to publicly link Snowflake to a third-party intrusion said its database was breached for 40 days. 

    By July 15, 2024
  • A man walks with an umbrella in front of AT&T logo.
    Image attribution tooltip
    Ronald Martinez via Getty Images
    Image attribution tooltip

    Massive Snowflake-linked attack exposes data on nearly 110M AT&T customers

    Attackers breached AT&T’s Snowflake environment for 11 days in April, and stole customers’ call and text message records spanning a six-month period from 2022.

    By July 12, 2024
  • SEC logo is on display outside its building in Washington, D.C.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    MOVEit legal liabilities, expenses pile up for Progress Software

    The prospective financial hit from a widely exploited vulnerability in the file-transfer service is growing. Progress confronts lawsuits, regulator scrutiny and government investigations.

    By July 10, 2024
  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    Snowflake allows admins to enforce MFA as breach investigations conclude

    Three months after an attacker targeted more than 100 customer environments, Snowflake is making it easier for existing customers to enforce MFA, but it isn’t requiring it.

    By July 9, 2024
  • Car dealership.
    Image attribution tooltip
    Mario Tama/Staff/Getty Images News via Getty Images
    Image attribution tooltip

    Sonic Automotive’s sales dip as CDK cyberattack causes material impact

    The company reported ongoing service disruptions and said vehicle sales declined after an attack on a third-party vendor.

    By July 8, 2024
  • Workers in a HubSpot office
    Image attribution tooltip
    Courtesy of HubSpot
    Image attribution tooltip

    HubSpot reports nearly 50 customer accounts compromised

    The customer relationship management vendor said it notified all impacted customers, but it has not publicly disclosed how attackers gained unauthorized access.

    By July 3, 2024
  • New cars parked at a dealership.
    Image attribution tooltip
    Bilanol/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    CDK eyes service restoration for all car dealers by Fourth of July

    The software vendor is critical to the automotive retail supply chain. A systemwide outage following a cyberattack has impacted more than 15,000 car dealers since June 19.

    By July 1, 2024
  • TeamViewer office headquarters.
    Image attribution tooltip
    Courtesy of TeamViewer
    Image attribution tooltip

    TeamViewer’s IT network breached through compromised employee credentials

    The remote access software provider said the impact of the attack from Midnight Blizzard was limited to its internal network and customer environments were not affected.

    By July 1, 2024
  • Vehicles for sale at an AutoNation car dealership.
    Image attribution tooltip
    Mario Tama/Staff/Getty Images News via Getty Images
    Image attribution tooltip

    CDK restores service for small group of car dealers

    The software vendor said it will restore critical services in phases, but warned some integrations with third-party vendors might be delayed.

    By June 27, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA warns chemical facilities of potential data theft

    The attack targeting the Chemical Facility Anti-Terrorism Standards program was linked to widely exploited vulnerabilities in Ivanti remote access VPNs.

    By June 25, 2024