The Latest

  • School buses stand idle on December 15, 2015 in Los Angeles, California.
    Image attribution tooltip
    David McNew via Getty Images
    Image attribution tooltip

    Los Angeles schools investigating claims of data for sale on dark web

    The alleged incident is raising questions as to whether there’s been a more recent data breach in the district since September 2022.

  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip

    Snowflake-linked attacks are testing the cloud’s shared responsibility status quo

    Assigning responsibility for missing security controls is tricky. The burden is collective but cloud providers need to raise minimum standards, experts say.

  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft will take full ownership for security failures in House testimony

    Brad Smith, the company’s vice chair and president, will acknowledge extensive security lapses while outlining steps the company, industry and nation need to move forward.

  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Rust Foundation leads the charge to improve critical systems security

    The foundation is standing up a consortium to boost the responsible use of the programming language at a time of heightened security risks.

  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Pure Storage comes forward as an early victim of Snowflake-linked attacks

    The data storage vendor said information exposed by the attack can’t be used to gain access to customer systems.

  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    SolarWinds file-transfer vulnerability ripe for exploitation, researchers warn

    Rapid7 researchers said Serv-U CVE can easily be exploited, a similar scenario that has led to other smash-and-grab attacks.

  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Critical PHP CVE is under attack — research shows it’s easy to exploit

    Researchers warn they are seeing thousands of attacks against various targets, including financial services and healthcare, in the U.S. and other countries. 

  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox to restart ERP upgrade as it looks past August cyberattack

    With the company out of recovery mode, teams are looking to advance on digital transformation projects. 

  • Customers queue outside the Apple Store in Milan on September 22, 2023 in Milan, Italy.
    Image attribution tooltip
    Ming Yeung via Getty Images
    Image attribution tooltip

    Apple makes a password manager play in a heavily targeted market

    The new, standalone app Passwords places credential management front and center for Apple’s massive user base.

  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    100 Snowflake customers attacked, data stolen for extortion

    A financially-motivated attacker used stolen credentials to systematically compromise customer accounts, steal a significant volume of data and extort victims, Mandiant said.

  • Google and the Consortium of Cybersecurity Clinics are collaborating on an effort to train diverse students in cybersecurity.
    Image attribution tooltip
    Courtesy of Consortium of Cybersecurity Clinics
    Image attribution tooltip

    Few CFOs control cybersecurity budgets

    Tech executives, not CFOs, most often call the shots on cybersecurity spending at middle market companies, according to a recent RSM US survey.

  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Frontier Communications says cyberattack snagged data from 751,000 people

    The breach notifications come almost two months after the company initially disclosed the April attack.

  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Telecom, media and tech companies are cyber defense standouts: Moody’s

    Cybersecurity spending in the sector doubled during the past five years, accounting for 10% of companies’ technology budgets in 2023, the credit ratings and research firm said.

  • The lobby inside a Snowflake office building.
    Image attribution tooltip
    Courtesy of Snowflake
    Image attribution tooltip

    Pressure mounts on Snowflake and its customers as attacks spread

    More businesses are likely impacted by an attacker’s access to multiple Snowflake customer databases.

  • The seal of the Federal Communications Commission.
    Image attribution tooltip
    Mark Wilson / Getty Images via Getty Images
    Image attribution tooltip

    FCC approves $200M K-12 cybersecurity pilot

    The three-year program will help schools begin to cover the costs of securing their networks from cyberattacks.

    Updated June 7, 2024
  • Liat Hayun, co-founder and CEO, Eureka Security.
    Image attribution tooltip
    Permission granted by Eureka Security
    Image attribution tooltip

    Tenable to acquire Eureka Security for greater visibility into cloud data environment

    The deal marks the latest acquisition in a market undergoing pricing adjustments and increased pressure to offer unified platforms.

  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Cyberattacks pose mounting risks to creditworthiness: Moody’s

    “As more data becomes available — thanks to recently adopted disclosure requirements — attacks continue to proliferate,” a Moody’s executive said.

  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House wants to harmonize the breadth of cybersecurity regulations

    National Cyber Director Harry Coker Jr. detailed White House strategy to streamline the administrative burden and cost of cyber compliance.

  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike soars above industry spending concerns, digs at rivals

    The cybersecurity firm defied growing industry pressures on cybersecurity revenue while continuing to jab rivals Microsoft and Palo Alto Networks. 

  • A group of three software developers converse in an office setting
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security concerns mount as businesses deploy AI coding tools

    Organizations are deploying the technology without enough protocols to ensure safe, secure use.

  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    CVE exploits, stolen credentials fueled ransomware surge in 2023

    Data leak site posts increased 75% to 4,520 posts in 2023, Mandiant said in a report.

  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    Snowflake customers caught in identity-based attack spree

    Cyber authorities and researchers warn many major companies could be compromised by the targeted attacks against Snowflake customer environments.

  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Cyber risk is rising for poorly configured OT devices

    Since late last year, researchers have identified more politically motivated groups targeting water and other key critical infrastructure systems.

  • cybersecurity, talent shortage, retention, leadership
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip
    Opinion

    How to identify and implement security automation use cases

    It might be a “fun” engineering challenge to see what is possible to automate, but often the results will not justify the expense and effort, Gartner’s Kevin Schmidt writes.

  • Live Nation corporate offices in Hollywood, California.
    Image attribution tooltip
    Mario Tama/Getty Images via Getty Images
    Image attribution tooltip

    Live Nation confirms jumbo breach, Ticketmaster customer data exposed

    The live concert and entertainment giant disclosed the compromise days after reports began surfacing of a data breach. The company said it detected the intrusion on May 20.