Threats: Page 12


  • Smart phone showing multiple payment apps.
    Image attribution tooltip

    Vaidik Trivedi

    Image attribution tooltip

    Payments industry makes a tempting target for hackers

    The industry should remain on high alert, though Russia's war on Ukraine has not caused a major uptick in cyberattacks. 

    By Jonathan Berr , Caitlin Mullen , Lynne Marek • March 21, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images
    Image attribution tooltip
    Opinion

    Telecoms are essential to everyone's cybersecurity challenges

    Communications systems are accessible almost anywhere, at any time by both friend and foe alike.

    By Jason Atwell • March 21, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Cyberthreats grow as US, NATO countries press Russia sanctions

    The FBI and CISA warned of potential new threats against satellite communications providers.

    By March 18, 2022
  • Image attribution tooltip
    Carsten Koall via Getty Images
    Image attribution tooltip

    Russian state-sponsored actors target PrintNightmare, MFA settings

    ESET researchers are separately warning about new data wiping malware.

    By March 16, 2022
  • Image attribution tooltip

    NicoElNino / Canva

    Image attribution tooltip
    Sponsored by Enzoic

    The threat from within: How to address the employee element in password security

    There are numerous sides to the password problem, but here are a few common issues to know.

    March 7, 2022
  • Sponsored by Keeper Security

    IT and tech firms hit hard by cyberattacks

      Lack of cybersecurity awareness among employees, especially regarding password security, also contributes to organizations' inability to comprehensively secure their networks.  

    March 7, 2022
  • Image attribution tooltip
    Paul O''Driscoll via Getty Images
    Image attribution tooltip
    Opinion

    Would a cyberattack on a NATO country trigger Article 5?

    Few nations have sophisticated cyber capabilities and for operational security reasons, they are closely guarded, rarely shared, and carefully used.

    By Mark Laity • March 2, 2022
  • Image attribution tooltip
    Chris McGrath via Getty Images
    Image attribution tooltip

    New wiper, worm attacks emerge in Ukraine targeting government and industry

    CISA shared indicators of compromise Thursday, months after the malware strains emerged. 

    By Updated April 29, 2022
  • Image attribution tooltip
    Jon Cherry via Getty Images
    Image attribution tooltip

    K-12 cyber risks complicated with Russia invasion of Ukraine

    One security expert tracked an uptick in threat actors scanning networks for vulnerabilities and looking for anyone to exploit.

    By Anna Merod • March 1, 2022
  • DHS, homeland security
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images
    Image attribution tooltip

    DHS to lead federal response to Russia-Ukraine crisis

    Cyberattacks in Ukraine continue as Russian troops enter Kyiv.

    By Feb. 25, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Botnets, data wiping malware spread as Ukraine incursion begins

    A new variant of Cyclops Blink is now targeting Asus routers. 

    By Updated March 18, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Rail transit vulnerable to cyberattacks, experts say

    Transit networks are a target of criminal and state actors intent on disrupting operations.

    By Dan Zukowski • Feb. 23, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Officials warn of asymmetric cyberattacks as Ukraine conflict simmers

    The alarms come amid DDoS attacks against targets in Ukraine. 

    By Feb. 16, 2022
  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    Threat actors pressure OT, critical infrastructure by leaking sensitive data

    Mandiant research shows threat actors exposing highly sensitive data amid increased attacks against industrial targets.

    By Feb. 2, 2022
  • Image attribution tooltip
    Martyn Aim via Getty Images
    Image attribution tooltip

    Conflict over Ukraine raises cyber risk for US enterprises

    A diplomatic standoff with Russia threatens to drag U.S. companies and critical infrastructure into wider security crisis that could echo NotPetya. 

    By Feb. 1, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Cyberthreat trends to watch in 2022

    Cybercriminals are finding ways to manipulate corporate data, and for that problem, there really is no end in sight.

    By Sue Poremba • Jan. 31, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    3 tactics shaping ransomware mitigation in 2022

    Though businesses have become more confident in preventing ransomware attacks, confronting risk is an internal commitment.

    By Samantha Schwartz • Jan. 31, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    DHS warns local authorities, critical infrastructure providers over potential Russia threat

    As tensions rise over a possible incursion into the Ukraine, federal authorities say Russia may launch direct cyberattacks against targets in the U.S. 

    By Jan. 25, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images
    Image attribution tooltip

    Careless employees behind the majority of insider threat incidents: report

    Insider cybersecurity threats continue to rise — and it's partially due to employee apathy. 

    By Samantha Schwartz • Jan. 25, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Boards, CISOs seek alignment on OT security challenges

    CISOs at industrial companies should inform senior leadership of the unique risks and challenges of potential ransomware and supply chain attacks.

    By Jan. 24, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip
    Opinion

    It's time to focus on critical infrastructure systems security

    Cyber-physical systems running on legacy infrastructure are ideal attack surfaces for malicious actors. 

    By Katell Thielemann • Jan. 24, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Ukraine tensions raise cyberthreats against US companies, critical infrastructure

    CISA is urging companies to prepare for cyber activity as an offensive malware that can wipe hard drives clean spreads in Ukraine.

    By Jan. 21, 2022
  • The seal of the FBI
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip

    Feds want businesses to report cyberattacks — the agency doesn't matter

    The FBI's Bryan Vorndran compared a cyberattack to a house robbery: Law enforcement assists with attack response while CISA is representative of an alarm company tasked with prevention. 

    By Samantha Schwartz • Jan. 14, 2022
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Google Drive, OneDrive top cloud apps for malware delivery: report

    Netskope's findings are based on blocked malware, so the hacker's attempts to get a user to open a malicious download were initially successful. 

    By Samantha Schwartz • Jan. 12, 2022
  • A person holds a credit card in front of a laptop computer.
    Image attribution tooltip
    Poike via Getty Images
    Image attribution tooltip

    NY attorney general probes widespread credential stuffing, 17 companies affected

    The OAG worked with the impacted companies to uncover how threat actors bypassed security safeguards, which led almost all the companies to strengthen security controls.

    By Samantha Schwartz • Jan. 6, 2022