Threats: Page 11


  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • A Ukrainian flag is raised above a protest crowd
    Image attribution tooltip

    Photo by Mathias P.R. Reding from Pexels

    Image attribution tooltip

    Russian disinformation campaigns disrupt Ukraine narrative

    State-linked, foreign groups use social media and phishing to manipulate Ukraine citizens and western allies.

    By May 24, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISOs say they're at less risk of a substantial cyberattack

    A modest confidence boost and more deliberate security strategies follow two years of pandemic-induced chaos, a Proofpoint-sponsored survey found.

    By May 17, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    Enterprises rarely follow advice to never pay ransoms

    Ransomware foists a difficult choice on executives and very few leave business operations in limbo to test a best practice.

    By May 16, 2022
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    Emotet reemerges as top malware in circulation

    The botnet’s activity surged 2,823% between Q4 2021 and Q1 2022, displaying a more recent shift in targets, HP Wolf Security analysts said.

    By May 12, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    US, allies blame Russia for Viasat cyberattack

    The Five Eyes and other EU authorities linked Russia to a series of web defacement, DDoS and destructive wiper attacks in the weeks leading up to the Ukraine invasion.

    By May 11, 2022
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    SEO-savvy threat actors drive surge in malware downloads

    Cybercriminals flooded Google and Bing with malicious PDF files that contain commonly searched keywords, resulting in a 450% annualized increase in phishing downloads.

    By May 10, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Threat actor launches email attacks to lift corporate M&A secrets, Mandiant says

    The suspected threat actor, UNC3524, lurks in victim environments for at least 18 months.

    By May 5, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Ukraine cyberthreat activity ramps up against critical infrastructure, governments

    Researchers say state-linked and criminal activity has risen in recent weeks.

    By May 4, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Familiar names top 2021's most-exploited vulnerabilities list

    Top ransomware operators, including Hive and Conti, are exploiting flawed systems to launch new attacks, researchers warn.

    By May 2, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Ransomware attacks, payouts soared worldwide in 2021: report

    More organizations are paying ransoms as attacks grow in sophistication.

    By April 27, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Emotet botnet tests new techniques after global crackdown

    The once prolific botnet, returning from "spring break," is preparing a new high-volume campaign, Proofpoint researchers said. 

    By April 26, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    HHS warns providers of 'exceptionally aggressive' ransomware group

    The Hive group practices double extortion — demanding payment to free data it has encrypted while also threatening to release the unencrypted data publicly.

    By Shannon Muchmore • April 25, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Cyber agencies renew warnings of Russia-linked threats against industrial targets

    Separately, the U.S. is expanding the Joint Cyber Defense Collaborative to include experts on industrial control systems.

    By April 21, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Threat detection accelerates in Asia, Europe, as notification trends shift

    Median dwell time fell as organizations boosted cybersecurity defenses, shared threat intelligence.

    By April 19, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Authorities warn dangerous new malware can shut down, sabotage industrial sites

    The malware initially targeted Schneider Electric and Omron controllers.

    By April 14, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Microsoft intercepts Zloader botnet, a distributor for Ryuk ransomware

    Ryuk was behind major attacks on healthcare, while the botnet focused on credentials and financial theft.

    By April 14, 2022
  • Image attribution tooltip
    David Dee Delgado via Getty Images
    Image attribution tooltip

    Microsoft blocks Russian cyberattacks linked to Ukraine war

    Strontium, a GRU-linked threat actor, targeted Ukraine media, foreign policy think tanks and government agencies in the U.S. and Europe.

    By April 8, 2022
  • Image attribution tooltip
    Anna Moneymaker via Getty Images
    Image attribution tooltip

    DOJ disrupts Russia-backed Cyclops Blink botnet

    The court-ordered operation is the latest effort to stop malicious cyber activity following the Russian invasion of Ukraine.

    By April 7, 2022
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Federal authorities urged to bolster intel sharing amid nation-state threats

    Current Russian cyber activity has been limited, but experts warn the threat may increase on short notice.

    By April 6, 2022
  • Secretary of State Antony Blinken speaks alongside President Joe Biden.
    Image attribution tooltip
    Mark Makela/Getty Images via Getty Images
    Image attribution tooltip

    State Department launches cyber bureau amid rising global tensions

    The long anticipated bureau aims to weave diplomacy into the global effort to combat ransomware and rogue nation-state activity.

    By April 5, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Viasat network cyberattack linked to newly discovered Russian wiper

    SentinelOne researchers said the malware, dubbed AcidRain, is behind the February attack on the satellite communications provider

    By April 1, 2022
  • Image attribution tooltip
    Permission granted by Code42
    Image attribution tooltip

    Cyber extortion surges 78% as 'ransomware as a service' spreads

    Most companies require at least a month to recover from a ransomware attack, Palo Alto Networks found.

    By Jim Tyson • March 29, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Nation-state threat actors remain steps ahead of defenders

    IT security leaders reveal significant gaps in their ability to identify and mitigate sophisticated attacks. 

    By March 28, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    White House warns US of possible Russian cyberattack linked to Ukraine invasion

    The broad warnings come after federal authorities convened more than 100 critical infrastructure organizations to share classified cyberthreat information.

    By March 21, 2022