Threats: Page 10


  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Mandiant red team breaches OT servers to mimic crime group techniques

    Researchers are not aware of financially motivated actors using these techniques in the wild.

    By July 27, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    New ransomware discovered using Rust, atypical encryption

    Luna’s use of platform-agnostic code allows threat actors to initiate attacks on different operating systems concurrently.

    By July 20, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    LockBit ransomware hitting network servers

    The latest tactic used to deploy the prolific malware allows threat actors to end processes, stop services and duplicate more quickly.

    By July 20, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    State-backed threat actors use Google Drive, Dropbox to launch attacks

    The Russia-linked threat actor behind the SolarWinds attack used cloud storage services to deploy malicious payloads using Cobalt Strike. 

    By July 19, 2022
  • Huawei logo depicted on side of building at company's campus in Dongguan, China.
    Image attribution tooltip
    Kevin Frayer via Getty Images
    Image attribution tooltip

    US effort to rip and replace hardware made in China is ballooning in cost

    A yearslong push to remove telecom equipment deemed a national security threat continues to vex regulators.

    By July 18, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    CISA releases indicators of compromise for hard-hit VMware Horizon

    Federal authorities warn a more complex form of malware is providing advanced persistent threat actors with vast command and control capabilities.

    By July 18, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Cyber insurers split on what’s most important in a security posture assessment

    To keep up with demand, cyber insurers acknowledge the need to rethink the underwriting process, research from Panaseer shows.

    By July 15, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Threat actors favor brute force attacks to hit cloud services

    Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.

    By July 12, 2022
  • Group of young business people discussing with colleagues on video conference on meeting.
    Image attribution tooltip
    vgajic via Getty Images
    Image attribution tooltip
    Opinion

    How CISOs can prepare for new and unpredictable cyberthreats

    CISOs often ask, “How do I avoid being hit by the next major cyberattack?” The problem is, that’s the wrong question.  

    By Jeremy D’Hoinne • July 11, 2022
  • A person works next to a 5G logo.
    Image attribution tooltip
    David Ramos/Getty Images via Getty Images
    Image attribution tooltip

    What to watch with 5G network security

    For wireless network carriers, 5G is a model of what’s next. But it also introduces features and services that dramatically expand the threat surface.

    By July 8, 2022
  • A representation of blockchain technology
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Hive ransomware group migrates code to Rust, accelerating data encryption

    Microsoft warns the newly discovered variant of one of the most prevalent ransomware payloads can process large amounts of data more quickly.

    By July 6, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Threat actors capitalize on red team tool capable of bypassing EDR, antivirus

    A malware sample uploaded to VirusTotal contained a malicious payload Brute Ratel C4. Upon evaluation, 56 vendors gave it a clean bill of health.

    By July 6, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Google TAG exposes hack-for-hire groups targeting activists and sensitive data

    The organizations have operated in regions across the globe, with some openly advertising their services.

    By July 5, 2022
  • A bronze depiction of ancient god Medusa with snakes in her hair on a teal background.
    Image attribution tooltip
    Paul Campbell via Getty Images
    Image attribution tooltip

    Federal authorities warn MedusaLocker ransomware targeting remote desktop vulnerabilities

    The ransomware as a service group began targeting healthcare and other industries in 2019. In recent months, activity has surged once again.

    By July 1, 2022
  • Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Cash-strapped Main Street organizations face global cyberthreats

    A House subcommittee hearing in Michigan helped show the persistent risks faced by local schools, government agencies and Main Street businesses.

    By June 29, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Is your remote IT job candidate legit?

    Organizations are seeing a rise in deepfakes and stolen identities during the job application process, the FBI said.

    By June 29, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Ransomware groups shift tactics and objectives

    Malware can play a major or nonexistent role in ransomware attacks. Threat actors are often only in it for the money.

    By June 15, 2022
  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images
    Image attribution tooltip

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can defenders keep up with the accelerated pace and scale of the cyber threat?

    By June 13, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    America's cyber chiefs have a long to-do list

    The federal government wants to lead by example and communicate the urgency of the moment. First, it needs to get its security affairs in order. 

    By June 9, 2022
  • Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Food supplier cyber risk spreads 1 year after JBS attack

    Ransomware attacks target common vulnerabilities like legacy OT systems and equipment that lacks modern security tools.

    By June 2, 2022
  • FBI Director Christopher Ray speaking at the annual Boston Conference on Cyber Security
    Image attribution tooltip

    Lee Pellegrini, Boston College

    Image attribution tooltip

    Russia, backed by ransomware gangs, actively targeting US, FBI director says

    The FBI is laser focused on preventing a destructive attack, FBI Director Christopher Wray said. The agency previously, helped to disrupt a 2021 Iran-backed attack on Boston Children’s Hospital. 

    By June 2, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Conti ransomware gang grows brash and flames out. What's next?

    The group's reported demise is likely a diversion. Members of the group still pose a significant ransom and data extortion threat to enterprises.

    By May 31, 2022
  • Futuristic city VR wire frame with group of people. This is entirely 3D generated image.
    Image attribution tooltip
    gremlin via Getty Images
    Image attribution tooltip

    Persistent vulnerabilities put VMware on the defense

    Recent flaws earned the company CISA's 10th emergency directive, the latest in a series of potential high-impact flaws for enterprise users.

    By May 27, 2022
  • High voltage towers in the dusk of the evening
    Image attribution tooltip
    yangphoto via Getty Images
    Image attribution tooltip

    Cybersecurity threat extends to utility credit ratings: Fitch

    Electric utilities, up against growing cyberthreats and poor security practices, "could result in negative rating actions," Fitch Ratings said.

    By Robert Walton • May 26, 2022