Threats: Page 13


  • Image attribution tooltip
    RobertPetrovic via Getty Images
    Image attribution tooltip

    What threats 4 security professionals are watching over the holidays

    With SOCs down a few people, the time away will test processes and technology. 

    By Samantha Schwartz • Dec. 23, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip
    Opinion

    Beyond backup: Modern ransomware coercion tactics and how to detect them before it is too late

    Despite lots of ransomware advice centering on backing up files and systems, it's important to remember that precursors to ransomware can be identified and attacks disrupted, the author writes. 

    By George Glass • Dec. 9, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Is the security of legacy IT providers prompting a confidence crisis?

    Research commissioned by CrowdStrike found security professionals are losing confidence in providers like Microsoft amid the rise in supply chain attacks. Microsoft has thoughts. 

    By Dec. 8, 2021
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    A year later, Nobelium-linked threat actors still target businesses, government

    Threat actors seeking sensitive data are compromising CSPs and MSPs to go after Microsoft 365 and Azure AD environments, Mandiant found. 

    By Dec. 6, 2021
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Insurer Lloyd's slashes coverage on state-sponsored cyberattacks, reflecting battered market

    The limits for state-sponsored attack coverage comes at a time when nation-state activity and ransomware linked to foreign threat actors is surging.

    By Dec. 3, 2021
  • Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    Majority of US retailers, critical infrastructure unscathed after holiday cyber warnings

    Industry averted a major cyber incident amid warnings from the FBI and CISA, though home furnishings retailer Ikea fought to contain a sophisticated phishing attack.

    By Nov. 30, 2021
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip
    Opinion

    3 ways the cybercriminal business is changing

    Now that ransomware has been thrust into the limelight, cybercriminals are adjusting their business models. Here is what enterprises need to know.

    By Robert McArdle • Nov. 29, 2021
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    The value of threat modeling in an evolving security landscape

    The flow of information is more unpredictable than it was just a few years ago, so the threat modeling that was once used doesn't work today. 

    By Sue Poremba • Nov. 29, 2021
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Enterprises prepare for ransomware threats during Thanksgiving

    Retail, transportation and other sectors are bracing for heightened cyber risks, placing renewed pressure on security operations. 

    By Nov. 22, 2021
  • Image attribution tooltip

    Fit Ztudio/Shutterstock

    Image attribution tooltip
    Sponsored by Druva

    Data resilience: The new frontier of modern day protection

    With data under constant stress, now is the time to shift from data protection to data resiliency.

    By Stephen Manley, CTO, Druva • Nov. 22, 2021
  • Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    ICS security investments blocked by management confusion

    Until cyber risks in operational technology are better understood — and IT and OT can overcome cultural differences — companies can stall additional investments.  

    By Samantha Schwartz • Nov. 10, 2021
  • A picture of the street sign stating "Wall Street." American flags drape over a nearby building
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip

    Ransomware actors attempt to toy with stock valuation, disrupt M&A, FBI says

    The agency warns that threat actors are trying to access time sensitive information in order to force targeted companies into making fast decisions on whether to pay a ransom. 

    By Nov. 3, 2021
  • Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    Most companies dealing with employee misuse of business apps: report

    Nearly half of organizations say they lack the ability to see how remote workers are using business applications that contain high-value data.

    By Nov. 2, 2021
  • Three pathways for hackers to crash the US power grid
    Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    Hackers could crash the US power grid, but money, not sabotage, is their focus

    For now, the capability remains in the hands of nation-state actors. But "sophistication can ultimately be bought," Edison Electric Institute's Scott Aaronson said.

    By Robert Walton • Nov. 2, 2021
  • Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    SolarWinds threat actor targets cloud services, Microsoft 365 mailboxes

    The threat actor is using a tactic called EWS impersonation to target mailboxes in Microsoft 365 and is also using cloud service providers to target end users, Mandiant researchers said. 

    By Nov. 1, 2021
  • Image attribution tooltip
    Dan Kitwood / Staff via Getty Images
    Image attribution tooltip

    Identity crisis: Why ransomware groups rebrand — and disappear

    Criminals are not known for telling the truth, but what they say is usually the only explanation for a disappearance. Even if it is a lie.

    By Samantha Schwartz • Oct. 28, 2021
  • SEC
    Image attribution tooltip
    "SEC" by SEC is licensed under CC BY 2.0
    Image attribution tooltip

    Cyberattacks spur demand for cyber insurance: Moody's

    "This is a critical area that we're challenged with," Securities and Exchange Commission Chair Gary Gensler said, describing the agency’s sharper focus on cyber risk.

    By Jim Tyson • Oct. 22, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Federal agencies warn of ransomware targeting water, wastewater treatment plants

    Months after the attack on a Florida water treatment plant, the FBI, CISA and other agencies are concerned about a new round of threats to vulnerable municipal sites.

    By Oct. 18, 2021
  • Image attribution tooltip
    Dan Kitwood/Getty Images News via Getty Images
    Image attribution tooltip

    2021 ransomware bitcoin activity eclipses last year, Treasury finds

    The number of suspicious activity report transactions is already up 30% over 2020 numbers and the agency has tracked billions of dollars in outgoing bitcoin payments potentially linked to ransomware.

    By Samantha Schwartz • Oct. 18, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Cybersecurity tool sprawl leading to burnout, false positives: report

    Security operations teams are wasting time on false alerts due to managing a high number of tools that don't interact well with each other, Trend Micro found.

    By Oct. 13, 2021
  • Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Insider threat environment faces challenges amid changing corporate landscape

    As remote work becomes permanent and employee turnover rises, companies face additional challenges in protecting sensitive data, according to a panel discussion at Mandiant Cyber Defense Summit.

    By Oct. 6, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    NIST urges supply chain to include cyber in risk management

    Industries that rely heavily on technology are the best at incorporating cyber in their supply chain risk management plans, according to NIST's Jon Boyens.

    By Samantha Schwartz • Oct. 5, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    REvil, DarkSide highlight surge in Q2 ransomware attacks: report

    The government sector saw more ransomware attacks, while financial services companies faced increased threats in the cloud, according to McAfee Enterprise research.

    By Oct. 4, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    With remote work, any employee could be an insider threat. How is CISA mitigating the risk?

    CISA released a self-assessment tool which organizations can use to generate reports on their tolerance and capabilities for preventing insider threats. 

    By Samantha Schwartz • Sept. 30, 2021
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip
    Deep Dive

    Microsoft, under attack from threat actors, positions itself as cyber guardian

    The pandemic created more business opportunity, but malicious actors dogged the company's technology stack. Now, the very same products touted as security defense tools are under fire. 

    By Sept. 29, 2021