• Image attribution tooltip
    Sean Rayford / Stringer via Getty Images

    How the Colonial Pipeline attack instilled urgency in cybersecurity

    The federal government and private sector are still coming to terms with how to protect operational technology in an increasingly volatile threat environment.

    By May 17, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images

    US, allies blame Russia for Viasat cyberattack

    The Five Eyes and other EU authorities linked Russia to a series of web defacement, DDoS and destructive wiper attacks in the weeks leading up to the Ukraine invasion.

    By May 11, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images

    Colonial Pipeline faces nearly $1M in penalties as federal regulator discloses violations

    The Transportation Department’s pipeline safety regulator scrutinized control room management, which may have contributed to the fuel disruptions from the 2021 ransomware attack.

    By May 6, 2022
  • Image attribution tooltip
    Permission granted by Gartner
    Sponsored by Gartner Peer Insights

    Cybersecurity quarterly benchmarks: Q1, 2022

    Gartner Peer Insights data and opinions run the gamut on cybersecurity maturity, budgets, and initiatives.

    May 2, 2022
  • Image attribution tooltip
    Permission granted by Cybersource
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • Image attribution tooltip
    David Dee Delgado via Getty Images

    Microsoft blocks Russian cyberattacks linked to Ukraine war

    Strontium, a GRU-linked threat actor, targeted Ukraine media, foreign policy think tanks and government agencies in the U.S. and Europe.

    By April 8, 2022
  • Image attribution tooltip
    JuSun via Getty Images

    Okta denies security incident as Lapsus$ group goes on a spree

    The identity and access management firm believes screenshots connected with the breach are related to a January security incident that was contained.

    By March 22, 2022
  • Image attribution tooltip
    monsitj via Getty Images
    Sponsored by Keeper Security

    Protecting against software supply chain attacks

    It's so important to protect the supply chain and ensure the companies you're working with are as committed to that protection as you are.  

    March 21, 2022
  • Image attribution tooltip
    Ian Forsyth / Stringer via Getty Images

    Kronos ransomware attack raises questions of vendor liability

    A cyberattack with supply chain and legal consequences has stakeholders considering contract minutiae.

    By Lance Whitney • March 14, 2022
  • Image attribution tooltip
    william thomas cain via Getty Images

    Sinclair losses mount as ransomware costs exceed insurance policy

    The group overhauled its internal security policies and named a board-level subcommittee as part of its ongoing attack recovery.

    By March 7, 2022
  • Sponsored by Keeper Security

    IT and tech firms hit hard by cyberattacks

      Lack of cybersecurity awareness among employees, especially regarding password security, also contributes to organizations' inability to comprehensively secure their networks.  

    March 7, 2022
  • Image attribution tooltip
    imaginima via Getty Images

    Cyber risk to US utilities seen as limited as Biden sets red line

    Critical infrastructure is on high alert, but — at least for now — the conflict in Europe could signal a lull in utility ransomware attacks.

    By Robert Walton • March 4, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images

    Ukraine war tests cyber insurance exclusions

    Enterprise customers should expect higher premiums and more restrictive underwriting criteria, though a recent court victory may force insurers to honor wartime claims.

    By March 3, 2022
  • Image attribution tooltip
    Chris McGrath via Getty Images

    New wiper, worm attacks emerge in Ukraine targeting government and industry

    CISA shared indicators of compromise Thursday, months after the malware strains emerged. 

    By Updated April 29, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images

    Cyberattack on Nvidia results in data leak, credential theft

    The incident took place as Russia's war in Ukraine unfolds against a backdrop of U.S. warnings to protect critical industries.

    By , Updated March 1, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images

    Botnets, data wiping malware spread as Ukraine incursion begins

    A new variant of Cyclops Blink is now targeting Asus routers. 

    By Updated March 18, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images

    US links Russia to Ukraine DDoS attacks

    Administration officials said there are no specific or credible cyberthreats to the U.S., but private sector organizations should report unusual activity. 

    By , Feb. 18, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images

    With K-12 cyberattacks expected to worsen in 2022, what can districts do?

    Collaboration with local, federal and ed tech leaders to find solutions may help address K-12's growing vulnerabilities to cyberattacks.

    By Anna Merod • Jan. 26, 2022
  • Image attribution tooltip
    da-kuk via Getty Images

    Google Drive, OneDrive top cloud apps for malware delivery: report

    Netskope's findings are based on blocked malware, so the hacker's attempts to get a user to open a malicious download were initially successful. 

    By Samantha Schwartz • Jan. 12, 2022
  • Image attribution tooltip
    rfranca via Getty Images

    Phishing lures await in Google Docs comments

    Email addresses are hidden when someone mentions a user in a comment, so the human instinct to question the legitimacy of the notification decreases. 

    By Samantha Schwartz • Jan. 10, 2022
  • Image attribution tooltip via Getty Images

    C-suite leaders are confident in ransomware protections, despite more attacks

    While it's important for non-IT and security leaders to have buy-in, CISOs have the responsibility to level with their C-suite counterparts on the true threat of ransomware, (ISC)² research shows.

    By Samantha Schwartz • Jan. 5, 2022
  • Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images

    One year later: Has SolarWinds changed how industry builds software?

    The SolarWinds hack caused government and industry leaders to rethink how software is made and secured, giving rise to close scrutiny of the software supply chain.

    By Samantha Schwartz • Dec. 14, 2021
  • Image attribution tooltip
    sefa ozel via Getty Images

    Cyberattacks keep targeting colleges. How can they protect themselves?

    Higher ed's sprawling systems mean cybersecurity doesn't come easy — or cheap. But smart strategies and thinking through risk can go a long way.

    By Liz Farmer • Dec. 9, 2021
  • Image attribution tooltip
    sestovic/E+/Getty via Getty Images

    A month after 'malicious' cyberattack, a small Colorado utility still doesn't have all systems back online

    Delta-Montrose Electric Association is still working to restore its payment and billing systems. Security experts say the recovery time points to a need for better backups.

    By Robert Walton • Dec. 7, 2021
  • Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images

    Cuba ransomware targets critical infrastructure, steals $44M in payments

    The threat actors compromised at least 49 organizations across the financial, government, healthcare, manufacturing, and information technology sectors. 

    By Samantha Schwartz • Dec. 6, 2021