The Latest

  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike says flawed update was live for 78 minutes

    Though CrowdStrike pulled the update, companies across sectors were already dealing with the cascading consequences that required manual remediations.

  • The flag of Ukraine pinned on the map. Horizontal orientation. Macro photography.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Dragos warns of novel malware targeting industrial control systems

    FrostyGoop, the ninth ICS-specific malware observed by Dragos, was linked to a January attack on an energy provider in Ukraine.

  • A massive IT outage stranded Delta Air Lines passengers at the Detroit Metropolitan Wayne County Airport on July 20.
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    CrowdStrike, Microsoft scramble to contain fallout from global IT outage

    Cybersecurity and IT experts said users are having major difficulties in recovery efforts, despite workarounds and guidance the vendors released.

  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike’s unforced error puts its reputation on the line

    The widespread release of defective code suggests CrowdStrike didn’t properly test its update before it was released or that process failed to catch the mistake, experts said.

  • A blue screen with an unhappy face is depicted on a screen in the background behind glass and in front of a person looking down.
    Image attribution tooltip
    Anthony Kwan / Stringer via Getty Images
    Image attribution tooltip

    CrowdStrike software update at the root of a massive global IT outage

    A defective software update led to major disruptions in aviation, banking and other industries as Microsoft 365 services were impacted worldwide.

    Updated July 19, 2024
  • The hospital instructor stands near the nurse to show her how to navigate the computer to insert notes.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Healthcare is an ‘easy victim’ for ransomware attacks. How hospitals can mitigate the damage.

    Limited resources in a highly connected ecosystem can make hospitals vulnerable, but planning ahead and implementing key protections could help thwart attacks.

  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    Majority of SEC civil fraud case against SolarWinds dismissed, but core remains

    The court ruling related to claims leading up to and immediately following the 2020 Sunburst supply chain hack.

    Updated July 18, 2024
  • A candlestick stock chart is seen out of focus against a background of $100 dollar bills in this composite stock image.
    Image attribution tooltip
    Honglouwawa via Getty Images
    Image attribution tooltip

    Larger deals propel cybersecurity funding to 2-year high in Q2

    Bigger rounds for more mature startups fueled a sustained period of funding growth for the sector, according to Crunchbase.

  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Weak credentials behind nearly half of all cloud-based attacks, research finds

    Credential mismanagement was the top initial access vector for cloud environment attacks during the first half of 2024, a Google Cloud report found.

  • UnitedHealth Group office
    Image attribution tooltip
    Courtesy of UnitedHealth Group
    Image attribution tooltip

    UnitedHealth’s cyberattack response costs to surpass $2.3B this year

    The healthcare giant’s new estimate is roughly $1 billion higher than previous forecasts as the cyberattack on subsidiary Change Healthcare continues to hamper its profit outlook.

  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Ransomware leak site posts jumped 20% in Q2

    Threat groups claimed attacks on 1,237 organizations during the quarter, marking an increase from Q1. U.S.-based businesses accounted for more than half of all victims, Reliaquest found.

  • Developer coding and programming on two with screens.
    Image attribution tooltip
    valentinrussanov via Getty Images
    Image attribution tooltip

    Nearly 1 in 3 software development professionals unaware of secure practices

    The knowledge gap, identified in a Linux Foundation report, comes as malicious hackers increasingly target critical vulnerabilities.

  • Advance Auto Parts distribution center in Kutztown, Pennsylvania
    Image attribution tooltip
    Permission granted by Advance Auto Parts
    Image attribution tooltip

    Snowflake-linked attack on Advance Auto Parts exposes 2.3 million people

    One of the few customers to publicly link Snowflake to a third-party intrusion said its database was breached for 40 days. 

  • Vehicles for sale at an AutoNation car dealership.
    Image attribution tooltip
    Mario Tama/Staff/Getty Images News via Getty Images
    Image attribution tooltip

    AutoNation warns CDK cyberattack will dent quarterly earnings

    The major North American car dealership estimates the attack will lead to a $1.50 per-share earnings impact.

  • A man walks with an umbrella in front of AT&T logo.
    Image attribution tooltip
    Ronald Martinez via Getty Images
    Image attribution tooltip

    Massive Snowflake-linked attack exposes data on nearly 110M AT&T customers

    Attackers breached AT&T’s Snowflake environment for 11 days in April, and stole customers’ call and text message records spanning a six-month period from 2022.

  • FTC sweep of dark patterns of SaaS companies
    Image attribution tooltip
    AntonioGuillem via Getty Images
    Image attribution tooltip

    76% of SaaS companies use ‘dark patterns,’ analysis finds

    With federal regulators and states clamping down on the practice, companies might take a hard look at how they’re presenting information on their websites and in their apps.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA calls for elimination of OS command injection vulnerabilities

    Threat groups target vulnerabilities in widely used network devices. CISA’s latest advisory urges software makers to eliminate them at the source.

  • UnitedHealth Group CEO Andrew Witty
    Image attribution tooltip
    Kent Nishimura/Getty Images via Getty Images
    Image attribution tooltip

    What does your CEO need to know about cybersecurity?

    CEOs can no longer skim over their cybersecurity plans. When big incidents occur, they risk shareholder lawsuits, regulatory charges or even job loss. 

  • SEC logo is on display outside its building in Washington, D.C.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    MOVEit legal liabilities, expenses pile up for Progress Software

    The prospective financial hit from a widely exploited vulnerability in the file-transfer service is growing. Progress confronts lawsuits, regulator scrutiny and government investigations.

  • Young businessman working alone at his desk on desktop computer in an open space modern coworking office.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    Risk escalates as communication channels proliferate

    The chance of losing data to a breach rises in tandem with the number of channels — like email and file sharing — that an organization uses.

  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    Snowflake allows admins to enforce MFA as breach investigations conclude

    Three months after an attacker targeted more than 100 customer environments, Snowflake is making it easier for existing customers to enforce MFA, but it isn’t requiring it.

  • Shot of a young businesswoman looking stressed while using a laptop during a late night at work.
    Image attribution tooltip
    Layla Bird via Getty Images
    Image attribution tooltip

    As CISOs grapple with the C-suite, job satisfaction takes a hit

    Research found CISO job satisfaction has direct ties to how much — or little — access security leaders have to company management.

  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Critical infrastructure providers seek guardrails on scope, timeline for CIRCIA rules

    In a last-minute push, critical infrastructure stakeholders urged federal officials to give more flexibility on the detail required during the first 72 hours of covered cyber incidents.

  • Car dealership.
    Image attribution tooltip
    Mario Tama/Staff/Getty Images News via Getty Images
    Image attribution tooltip

    Sonic Automotive’s sales dip as CDK cyberattack causes material impact

    The company reported ongoing service disruptions and said vehicle sales declined after an attack on a third-party vendor.

  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Microsoft warns of elevated risk in Rockwell Automation PanelView Plus CVEs

    Microsoft researchers warn the vulnerabilities can be exploited, potentially resulting in remote code execution and denial of service.