The Latest

  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    SMBs hit by rise in legitimate tool-based attacks

    Attackers are moving away from malware and evading detection by abusing remote monitoring and management software, according to Huntress research.

  • An animated megaphone with a purple dotted background
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    The top cybersecurity events and conferences in 2024, according to security pros

    Which security conferences are teams prioritizing in 2024? A new report reveals the 7 most popular events in the cybersecurity calendar.

  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Andrii Yalanskyi via Getty Images
    Image attribution tooltip

    Companies are getting smarter about cyber incidents

    Although incidents are up and risks are expanding, businesses are better prepared to send threat actors away empty-handed, a specialist says.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA explains how to apply secure-by-design principles

    The focus should be on what manufacturers are doing to keep their customers safe, not the damage attackers might be inflicting, CISA’s Bob Lord said. 

  • Spider web
    Image attribution tooltip
    Matt Cardy / Getty Images Europe via Getty Images
    Image attribution tooltip

    Threat actors behind Las Vegas casino attacks are social-engineering mavens

    Scattered Spider threat actors are attacking large companies and their IT help desks to steal data for extortion, according to federal cyber authorities.

  • Estes Express Lines CIO Todd Florence and President and COO Webb Estes discuss the October cyberattack on the company.
    Image attribution tooltip
    Permission granted by Estes Express Lines
    Image attribution tooltip

    ‘Honesty’: Estes details its playbook for responding to a cyberattack

    Being open about the incident engendered goodwill from customers and colleagues, executives said.

  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Stanley Steemer hack breached data of almost 67K customers

    The cleaning company said attackers gained access to its systems nearly a month before the intrusion was discovered in March.

  • Cyber internet security and privacy concept. Database storage 3d illustration.
    Image attribution tooltip
    JuSun via Getty Images
    Image attribution tooltip

    FCC proposes 3-year cybersecurity pilot for schools, libraries

    The agency will seek public comment on the proposal, which will explore how the Universal Service Fund can support school and library cyber concerns.

  • A bicyclist rides by a sign that is posted in front of the Cisco Systems headquarters on August 10, 2011 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Cisco looks to Splunk for security business growth

    Security remains a small part of Cisco’s business, but Splunk could bolster the company’s ability to grow and improve other offerings.

  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox CISO departs months after cyberattack

    The C-suite change comes in the aftermath of a cyberattack that damaged IT infrastructure, led to widespread disruption and negatively impacted earnings. 

  • Woman in a black suit stands behind a podium with a sign that reads "enhancing cybersecurity protecting New Yorkers."
    Image attribution tooltip
    Courtesy of Darren McGee/ Office of Governor Kathy Hochul
    Image attribution tooltip

    New York proposes ‘nation-leading’ hospital cybersecurity regulations

    The rules, which would require facilities to develop response plans and hire a chief information security officer, aim to safeguard hospitals from growing threats and keep them operating during an attack.

  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks’ largest customers get no-cost incident response

    Available through January, the response program comes at a time of heightened demand for rapid forensic services, particularly in light of the coming SEC incident response enforcement. 

  • Juniper bush.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    5 Juniper CVEs actively exploited in the wild

    The vendor warned the Junos OS vulnerabilities can be chained to remotely execute code.

  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    D3Damon via Getty Images
    Image attribution tooltip

    File-transfer services, rich with sensitive data, are under attack

    This year has seen a trio of supply-chain attacks that created turmoil for thousands of corporate victims and their customers.

  • Workers at a security operations center at Rackspace.
    Image attribution tooltip
    Courtesy of Rackspace Technology
    Image attribution tooltip

    Rackspace records $5M in expenses related to 2022 ransomware attack

    The cloud services company expects insurance to cover its incident costs, however multiple lawsuits are still pending.

  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Dragos again targeted by ransomware group, this time from AlphV

    The industrial cybersecurity specialist previously thwarted a shakedown attempt in May and says the current threat has not been substantiated.

  • Boeing employees work on a Boeing 787 Dreamliner on one of the assembly lines February 14, 2011 at the company's factory in Everett, Washington.
    Image attribution tooltip
    Stephen Brashear via Getty Images
    Image attribution tooltip

    Weeks after Boeing attack, ransomware group leaks allegedly stolen files

    The company’s data was leaked two weeks after the prolific Russia-affiliated group, LockBit, claimed responsibility for the attack.

  • A brick building with a sign that says "Henry Schein Inc."
    Image attribution tooltip
    Bruce Bennett via Getty Images
    Image attribution tooltip

    Henry Schein says customer data breached in cyber incident

    The company lowered its 2023 sales and earnings forecasts in response to the incident, which took some of its distribution systems offline.

  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    As Congress weighs budget priorities, top cyber execs urge CISA funding support

    The group, led by Tenable CEO Amit Yoran, raised concerns that significant cuts to the agency would undermine efforts to combat rising threats to critical infrastructure and federal systems.

  • Portland, Maine
    Image attribution tooltip
    "Portland, Maine" by Me in ME is licensed under CC BY 2.0
    Image attribution tooltip

    For Maine, the MOVEit attack is personal

    With 1.3 million individuals compromised, the level of exposure on an individual basis is one that's representative of a compromise of its entire population.

  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Chinese banking giant’s US arm hit by ransomware attack

    The hack reportedly disrupted the trading of U.S. Treasuries. The Industrial and Commercial Bank of China Financial Services said it is investigating the attack and progressing recovery efforts.

  • Real estate for sale sign in residential neighborhood, New Jersey, USA.
    Image attribution tooltip
    SondraP via Getty Images
    Image attribution tooltip

    Mr. Cooper customers’ data exposed by cyberattack

    The mortgage servicing provider has yet to determine how many of its 4.3 million customers had data compromised or the extent of potential damage.

  • Exterior of MGM Grand Hotel & Casino in Las Vegas
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    MGM Resorts anticipates no further disruptions from September cyberattack

    The company expects insurance to cover more than $100 million in losses stemming from lost bookings and disruptions at its Las Vegas properties.

  • A croupier holds poker cards in his hands at a table in a casino.
    Image attribution tooltip
    Lacheev via Getty Images
    Image attribution tooltip

    Ransomware targeting casinos is on the rise, FBI warns

    Threat actors have used phishing attacks and exploited vulnerabilities in third-party vendor remote access tools to target the casino gaming industry.

  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    CitrixBleed sparks race to patch, hunt for malicious activity

    CISA urged organizations to patch, mitigate and report any positive findings as Citrix NetScaler ADC and NetScaler Gateway users remain exposed to session hijack.

  • Singapore skyline
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Cyberattack hits Singapore’s Marina Bay Sands hotel and casino

    The Las Vegas Sands Corp.-owned property said the intrusion exposed the personal data of about 665,000 people.