Threats


  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    Microsoft warns 3K exposed ASP.NET machine keys at risk of weaponization

    An unknown threat actor recently used an exposed key for code injection cyberattacks. 

    By Feb. 7, 2025
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    Suspected botnet targets edge devices using brute force attacks

    Researchers warn of a surge in attempted logins targeting devices from SonicWall, Palo Alto Networks and others.

    By Feb. 7, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Hackers deployed web shells, exploited public-facing applications in Q4

    A Cisco Talos report also indicated a sharp increase in remote access tools being leveraged in ransomware. 

    By Feb. 6, 2025
  • Cyber Security Data Breach Protection Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    State-linked hackers deploy macOS malware in fake job interview campaign

    Actors linked to North Korea bypassed Apple security using malware called FlexibleFerret.

    By Robert Wright, Contributing Reporter • Feb. 4, 2025
  • Front of Hewlett Packard Enterprise's campus in Houston.
    Image attribution tooltip
    Courtesy of HPE
    Image attribution tooltip

    HPE probes hacker claim involving trove of sensitive company data

    The vendor said it has no immediate evidence of operational impacts or compromised customer data.

    By Jan. 21, 2025
  • Statue of Alexander Hamilton.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Treasury Department issues sanctions linked to cyber intrusions, telecom attacks

    The Office of Foreign Assets Control took measures against a state-linked hacker and a Shanghai-based cybersecurity firm in response to the recent attacks against critical infrastructure in the U.S.

    By Jan. 21, 2025
  • A Starbucks worker holds a beverage.
    Image attribution tooltip
    Courtesy of Starbucks
    Image attribution tooltip

    Blue Yonder investigating Clop ransomware threat linked to exploited Cleo CVEs

    The financially-motivated hacker was previously linked to the mass exploitation of critical vulnerabilities in MOVEit file-transfer software.

    By Jan. 17, 2025
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyberattacks, tech disruption rank as top threats to business growth

    Two in five executives view data breaches and leaks as the most financially burdensome man-made threats, a Chubb study found.

    By Alexei Alexis • Jan. 10, 2025
  • FBI Director Chris Wray announces a major operation to disrupt a state-linked botnet, during a speech the Aspen Cyber Summit, Sept. 18, 2024.
    Image attribution tooltip
    Permission granted by Aspen Cyber Summit, Laurence Genon
    Image attribution tooltip

    US Treasury office sanctions firm connected to state-sponsored Flax Typhoon threat group

    A Beijing-based cybersecurity company, Integrity Technology Group Inc., is linked to years of exploitation activity targeting U.S. critical infrastructure.

    By Jan. 6, 2025
  • View of Rhode Island statehouse
    Image attribution tooltip
    sgoodwin4813 via Getty Images
    Image attribution tooltip

    Rhode Island officials warn residents as ransomware group threatens social services data leak

    The personal data of hundreds of thousands of vulnerable residents is at risk after a threat group attacked a state social services database.

    By Dec. 18, 2024
  • African engineer are analyzing problems with robotic arms in manufacturing with tablets
    Image attribution tooltip
    Permission granted by Imprivata
    Image attribution tooltip
    Sponsored by Imprivata

    Frontline workforce tech predictions for 2025: A new era of efficiency and security

    2025 Predictions: Boosting frontline efficiency with passwordless tech and identity and access management innovations

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Dec. 9, 2024
  • A person wearing jeans and a sweater holds a credit card over a laptop, with a blurry holiday tree in the background.
    Image attribution tooltip
    stock photo via Getty Images
    Image attribution tooltip

    FBI, CISA warn of heightened risk of BEC attacks during holiday season

    Authorities encouraged prompt reporting, which can help recover stolen payments.

    By Nov. 27, 2024
  • 3 People voting at individual voting booths at a voting station outside of a brick building.
    Image attribution tooltip

    Canva

    Image attribution tooltip
    Sponsored by Center for Internet Security

    Countering multidimensional threats: lessons learned from the 2024 election

    In 2024, election officials and law enforcement shared intelligence closely to counter complex threats.

    Nov. 18, 2024
  • password to access personal user data, cybersecurity concept
    Image attribution tooltip

    stock.adobe.com/Song_about_summer

    Image attribution tooltip
    Sponsored by Imprivata

    The company you keep: your most trusted vendor could be your biggest security risk

    Your trusted vendor might be your biggest security risk. Learn how to mitigate third-party threats.

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber, Imprivata • Nov. 11, 2024
  • Phone in hand with 'pay' button showing
    Image attribution tooltip
    Tero Vesalainen via Getty Images
    Image attribution tooltip

    AI increases fraud risk, fintechs say

    Financial firms monitor for fraud by looking for unusual activity, but an artificial intelligence model can be trained to transact like a real person.

    By Patrick Cooley • Nov. 5, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Enterprise executives cite AI-assisted attacks as top emerging risk, Gartner finds

    The analyst firm’s survey underscores growing concern about potential, yet unrealized, scenarios involving AI’s potential role in attacks.

    By Nov. 4, 2024
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Iran-linked attackers hit critical infrastructure with brute force

    CISA and the FBI warn healthcare, government, IT and other sectors of password spraying and multifactor authentication push bombing.

    By Oct. 17, 2024
  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

    By Oct. 2, 2024
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Phishing remains cloud intrusion tactic of choice for threat groups

    The long-lasting effectiveness and success of phishing campaigns underscores the most central challenge in cybersecurity — people are the weakest link.

    By Oct. 2, 2024
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

    By Sept. 26, 2024
  • an employee looks into a screen showing a chatbot interface
    Image attribution tooltip
    Laurence dutton via Getty Images
    Image attribution tooltip

    Data privacy concerns swirl around generative AI adoption

    IT and business professionals fear the technology's adoption can lead to data leakage, according to a Deloitte report.

    By Roberto Torres • Sept. 25, 2024
  • Code on a black and white background that appears warped.
    Image attribution tooltip
    HenrikNorway via Getty Images
    Image attribution tooltip

    Dark web exposure is ‘highly correlated’ with cyberattack risk

    Organizations that are mentioned in dark web market listings are more than twice as likely to experience an attack, Marsh McLennan found.

    By Alexei Alexis • Sept. 24, 2024
  • A person in a grey sweater hovers over a laptop with their hands.
    Image attribution tooltip
    mapo via Getty Images
    Image attribution tooltip

    Cybersecurity firm flags attack on construction accounting system

    Users of Foundation Software, which serves 43,000 construction pros, may be at risk of intrusion if they still use default credentials, according to cybersecurity firm Huntress.

    By Matthew Thibault • Sept. 20, 2024
  • View of the Seattle skyline
    Image attribution tooltip
    Abbie Parr/Getty Images via Getty Images
    Image attribution tooltip

    Port of Seattle official flags a cyber dilemma, ‘one-way street’ with federal agencies

    A ransomware atttack disrupted the Seattle-Tacoma International Airport for weeks. Part of the problem, one official said, is that federal cyber recommendations are not timely.

    By Sept. 19, 2024
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Open source maintainers, under security pressure, remain largely unpaid after XZ Utils

    A report by Tidelift shows an equity gap remains between open source developers and well-resourced software users who are pushing for higher security standards.

    By Sept. 17, 2024