Page 3


  • Aerial picture of high rises
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Dallas still recovering from ransomware on eve of municipal election

    City officials say the attack would not affect the election, but many services remain down.

  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    Google, Dashlane separately move to eliminate passwords

    In unrelated moves, the companies highlighted a growing effort to phase out dependence on passwords amid a rise in phishing attacks.

  • City skyline
    Image attribution tooltip
    RoschetzkyIstockPhoto via Getty Images
    Image attribution tooltip

    Dallas ransomware attack causes critical service outages

    Websites for the city and its police department, which serves a population of nearly 1.3 million people, currently return 503 error pages.

  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    Cybersecurity Dive asked CISOs and other cyber experts what they do with their passwords. Here’s how they manage the mess that awaits us all.

  • Merck sign
    Image attribution tooltip
    Marko Georgiev / Stringer via Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

  • Lee Klarich, chief product officer at Palo Alto Networks, on stage at RSA Conference 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Cybersecurity pros plant seeds of hope at RSA Conference

    Optimism floated on the surface during the annual industry gathering. For one keynote on stage, it was the central theme.

  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Most open source maintainers still consider themselves hobbyists, despite compensation pledges

    A study by Tidelift shows a compensation gap for the key producers of open source applications, raising questions about how to properly secure software supply chains.

  • RSA Conference 2023 banner at Moscone Center in San Francisco on April 25, 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    3 areas of generative AI the NSA is watching in cybersecurity

    Generative AI is a “technological explosion,” NSA Cybersecurity Director Rob Joyce said. While it is game changing, it hasn’t yet delivered. 

  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

  • Mandiant CEO Kevin Mandia on stage at RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Mandiant CEO’s 7 tips for cyber defense

    Organizations’ institutional knowledge is an advantage that no adversary can match, Kevin Mandia told RSA Conference attendees.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA seeks public comment on software security attestation form

    The release is part of a larger effort by the Biden administration to strengthen software security at the development stage.

  • People walk past a sign for RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Acting National Cyber Director downplays reports of interagency strife

    There’s been no sign of tension between U.S. cybersecurity officials during Kemba Walden’s tenure, at least from her perspective.

  • Image shows a hand on a dial emblazoned with the word risk.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Global cyber insurance prices continue to moderate in Q1

    Marsh data shows rate increases slowing, stemming in part from new entrants into the cyber insurance market and fewer ransomware attacks in 2022.

  • Kemba Walden, acting national cyber director, rolls out the National Cybersecurity Strategy at a forum by the Center for Strategic and International Studies.
    Image attribution tooltip
    Permission granted by Office of the National Cyber Director
    Image attribution tooltip

    White House to share roadmap for national cyber strategy implementation this summer

    Acting National Cyber Director Kemba Walden said the strategy is built to have a 10-year shelf life, allowing for flexibility as new technologies and threats emerge. 

  • ChatGPT on computer screen
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    OpenAI adds more data privacy guardrails for ChatGPT

    The company is allowing users to turn off chat history and export data as it seeks to reach enterprise customers.

  • Graphic of digital money transfer symbols overlaid on a map of the world
    Image attribution tooltip
    ArtemisDiana via Getty Images
    Image attribution tooltip

    NCR restores more services following ransomware attack

    The company, which provides point-of-sale and back-office services, is still working to regain full access for restaurant and retail customers.

  • A digital lock on a computer memory board with red and blue lights intersecting
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    More than 2K organizations at risk of major attacks linked to SLP vulnerability

    Over 54,000 SLP-speaking instances and 670 product types are vulnerable, researchers from BitSight and Curesec found, including VMware ESXi Hypervisor. 

  • Brain icon symbolizing AI in center of photo surrounded by other icons representing the potential widespread use of AI in technology
    Image attribution tooltip
    bymuratdeniz via Getty Images
    Image attribution tooltip

    Teenagers, young adults pose prevalent cyberthreat to US, Mandiant says

    The brains behind high-profile attacks last year, teenagers and young adults use sophisticated social engineering techniques for intrusions.

  • Abstract planet made up of squares.
    Image attribution tooltip
    Gegham Qalajyan via Getty Images
    Image attribution tooltip

    Supply chain attack that hit 3CX caught at least 4 other victims, Symantec says

    Malware-laced financial trading software X_Trader ensnared two critical infrastructure organizations in the energy sector. 

  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    IT managers uneasy with snooping software: report

    Surveillance tools may cause an uptick in staff attrition and make hiring more difficult, a 1E survey found. 

  • Computer engineer working with a computer interface in a factory.
    Image attribution tooltip
    Thinkhubstudio via Getty Images
    Image attribution tooltip

    Early warning threat information platform launched for OT

    The platform will provide a vendor-agnostic option for sharing early threat information and intelligence across industries, the group said Monday. 

  • Digital background depicting innovative technologies in (AI) artificial systems, neural interfaces and internet machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT to sharpen cyberthreats, but no need to panic yet

    Startling dangers, such as autonomous attack mechanisms and sophisticated malware coding, have yet to materialize. For now, the threat is more specific.

  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    3CX has a 7-part plan to shore up its security

    The company is planning significant security upgrades and changes to network operations after a historic attack from a state-linked actor.

  • Typhoon makes landfall in Shanghai, China.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Microsoft summons weather events to name threat actors

    Under the new taxonomy, a blizzard or typhoon designation represents a nation-state actor and financially motivated threat actors fall under the family name tempest.