The Latest

  • An exterior image of a hotel
    Image attribution tooltip
    Robert Mora via Getty Images
    Image attribution tooltip

    Caesars Entertainment faces class action lawsuits following rewards database hack

    At least four separate plaintiffs allege the company was negligent for allowing their sensitive personal data to be stolen in a social engineering attack by criminal threat groups. 

  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA rolls dice on public service campaign to raise cyber awareness

    The agency is hoping to get families and small businesses to adopt MFA, use stronger passwords and recognize phishing attacks.

  • Campbell Soup
    Image attribution tooltip
    Christopher Doering/Cybersecurity Dive
    Image attribution tooltip

    Campbell Soup says summer cyberattack caused limited business impact

    The company will incur some costs, but it considers the disruption nonmaterial.

  • An open atrium filled with plants with stars crossing open floors.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    AWS bets on accuracy in generative AI deployment race

    The cloud giant is taking a full-stack approach to generative AI, which doubles down on security and reliable results.

  • Hotel Exterior
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    MGM Resorts warns customers of fraud as it faces class action lawsuits

    The plaintiffs claim the company was negligent for failing to protect customer data despite prior warnings about previous attacks.

  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip
    Deep Dive

    MOVEit mass exploit timeline: How the file-transfer service attacks entangled victims

    The slow-moving disaster has ensnared some of the world's largest enterprises. Cybersecurity experts expect further damage to come.

    Updated Sept. 25, 2023
  • City skyline at sunset
    Image attribution tooltip
    dibrova via Getty Images
    Image attribution tooltip

    Royal lurked in Dallas’ systems weeks before ransomware attack

    The prolific threat actor gained initial access on April 7 and stole almost 1.2 TB of data before it deployed ransomware on May 3, city officials said in a post-attack report.

  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    CISA urges use of memory safe code in software development

    Unsafe programming languages, like C and C++, account for more than 70% of security vulnerabilities. 

  • Group of employees at a table
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Average insider cyberthreat cost spikes 40% in 4 years

    Outsmarting insiders is a “go-to tactic” for many cyberattackers looking to steal credentials and gain access to critical data, the Ponemon Institute found.

  • Exterior of MGM Grand Hotel & Casino in Las Vegas
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    MGM Resorts says hotel, casino operations back up and running

    The company was still working to restore online functionality for hotel reservations and rewards program users following a major cyberattack.

  • A bicyclist rides by a sign that is posted in front of the Cisco Systems headquarters on August 10, 2011 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Cisco to buy Splunk for $28B

    Forrester's Allie Mellen calls it a massive win for Cisco's security business, but said security leaders are concerned about potential SIEM quality degradation. 

  • The CSC 2.0 report examines the progress made toward implementing the recommendations of the CSC, a congressionally mandated body that was designed to review the ability of the U.S. to deter maliciou
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    US is making headway on securing cyber infrastructure, commission says

    While Cyberspace Solarium Commission leaders praised U.S. cybersecurity improvements, they said more work is needed to secure critical infrastructure.

  • Chatbot conversation. Person using online customer service with chat bot to get support. Artificial intelligence and CRM software automation technology. Virtual assistant on internet.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    AI is entering the enterprise application security tool stack

    Reports from Gartner and Rackspace show a broad enterprise appetite to weave AI into the tool stack, especially across application security.

  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox warns of product shortages a month after disclosing cyberattack

    The household product maker said the incident damaged IT systems and will have a material effect on its fiscal Q1 performance.

  • FBI Director Chris Wray addresses the 2023 mWISE Conference from Mandiant.
    Image attribution tooltip
    Courtesy of Mandiant
    Image attribution tooltip

    FBI director urges private sector to work with the agency on cyber threats

    Christopher Wray told attendees at Mandiant’s mWISE 2023 private sector assistance contributed to the success of several recent operations.

  • Sand slipping through hands cupped together.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip
    Deep Dive

    Security has an underlying defect: passwords and authentication

    Cyberattacks are fueled by the shortcomings of business authentication controls. Bad things happen when access falls apart and credentials land in the wrong hands.

  • Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules: What’s the role of the CIO?

    CIOs are on the front lines of managing the IT estate, making them a critical part of rapid incident response. 

  • An MGM Resorts sign
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    MGM, Caesars attacks raise new concerns about social engineering tactics

    Multiple threat groups have employed the same criminal tool kit to target vulnerable systems.

  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    5 steps organizations can take to counter IAM threats

    Many organizations lean on identity and access management tools to perform credential management and authentication. But these systems aren’t foolproof.

  • Hotel Exterior
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    Threat actors claim to have compromised MGM Resorts’ Okta environment

    AlphV may have used tactics similar to social engineering attacks disclosed by Okta in regulatory filing. 

  • The United States Capitol Building seen at a distance.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    6 stories on how SEC’s cyber rules are changing security response

    As enforcement of the rules takes effect later this year, themes around how and when businesses will disclose security incidents will emerge. 

  • An exterior image of a hotel
    Image attribution tooltip
    Robert Mora via Getty Images
    Image attribution tooltip

    MGM Resorts disruption linked to recent attacks against hospitality industry

    Security researchers link the threat group Scattered Spider to a wave of malicious activity as Caesars Entertainment confirms social engineering attack in regulatory filing.

  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    White House, federal cyber leaders pledge renewed support for open source security

    CISA released a roadmap for open source software security as industry officials convened to map out additional steps to protect federal agencies and the larger ecosystem.

  • An exterior image of a the Bellagio hotel in Las Vegas
    Image attribution tooltip
    Robert Mora via Getty Images
    Image attribution tooltip

    MGM Resorts discloses cyber incident in filing with SEC

    Moody’s Investors Service called the cyber incident credit negative, and MGM is still taking steps to protect data and fully secure business operations. 

  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    Compromised credential use jumps 300% in cloud intrusions: IBM

    Valid credentials are also a hot commodity in the cybercrime marketplace, accounting for the vast majority, almost 90%, of assets for sale on the dark web, IBM found.