• A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images

    Internal Cisco data stolen after employee hit by voice phishing attack

    Cisco identified the attacker as an initial access broker with ties to multiple cybercrime and ransomware groups.

    By Aug. 11, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip


    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • A sample phishing text message provided by Twilio.
    Image attribution tooltip


    Twilio employees duped by text message phishing attack

    The communications provider declined to say how many employees were duped and the amount of customers compromised.

    By Aug. 8, 2022
  • Gas pipeline with multiple valves.
    Image attribution tooltip
    insagostudio via Getty Images

    Encevo stays resilient post-attack, but it’s still assessing the data damage

    The Luxembourg energy supplier’s ability to thwart a shutdown likely empowered its refusal to pay a ransom.

    By Aug. 8, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images

    The 11 most-prevalent malware strains of 2021 fuel cybercrime

    Cybercriminals remain the most prolific users of malware, wielding these top strains to deliver ransomware and steal data.

    By Aug. 5, 2022
  • Photograph of pipeline construction project.
    Image attribution tooltip
    JZ Hunt via Getty Images

    Luxembourg energy supplier Encevo hit by ransomware attack

    The group behind the attack threatened to leak more than 150 gigabytes of sensitive data on Monday.

    By Aug. 1, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images

    Most cyberattacks come from ransomware, email compromise

    Attackers are scanning for vulnerabilities in unpatched systems within 15 minutes, stressing the pace and scale of the threat.

    By Aug. 1, 2022
  • Digital background with an unopened keylock
    Image attribution tooltip
    MF3d/E+ via Getty Images
    Sponsored by Delinea

    Benefits of modern PAM: Efficiency, security, compliance

    Cloud-ready Privileged Access Management (PAM) is vital to your cyber defense strategy.

    By Shweta Khare, Cybersecurity Evangelist, Delinea • Aug. 1, 2022
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images

    Entrust acknowledges June cyberattack, remains tight-lipped on the details

    The cybersecurity vendor has yet to disclose how the incident occurred, the type of data stolen and if ransomware was involved.

    By July 28, 2022
  • The T-Mobile logo is displayed outside of a T-Mobile store on April 24, 2017 in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images

    T-Mobile agrees to $500M settlement for 2021 cyberattack

    The wireless carrier suffered a massive data breach in the summer of 2021, the fifth publicly acknowledged incident of its type in three years.

    By July 25, 2022
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images

    LockBit ransomware hitting network servers

    The latest tactic used to deploy the prolific malware allows threat actors to end processes, stop services and duplicate more quickly.

    By July 20, 2022
  • Florida International University campus
    Image attribution tooltip
    Permission granted by Florida International University

    Ransomware attacks surge in education sector

    Colleges and universities are particularly challenged as repercussions of ransomware hit them harder and longer than other organizations.

    By July 14, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images

    Threat actors favor brute force attacks to hit cloud services

    Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.

    By July 12, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images

    Hospital ransomware concerns rise after payment vendor breach, North Korea threats

    A recently disclosed ransomware attack could have exposed patient data from more than 650 healthcare providers.

    By Rebecca Pifer • July 11, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images

    Pricing pressures moderate as cyber insurance market begins to level out

    A surge in new buyers has begun to offset years of rising claims and higher premiums, according to data from global insurance firm Marsh.

    By July 1, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images

    Ransomware groups shift tactics and objectives

    Malware can play a major or nonexistent role in ransomware attacks. Threat actors are often only in it for the money.

    By June 15, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images

    How and why ransomware responses go haywire

    A lack of fortitude and preparation on the communications front often puts enterprises at risk for greater harm.

    By June 13, 2022
  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can defenders keep up with the accelerated pace and scale of the cyber threat?

    By June 13, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive

    America's cyber chiefs have a long to-do list

    The federal government wants to lead by example and communicate the urgency of the moment. First, it needs to get its security affairs in order. 

    By June 9, 2022
  • Image attribution tooltip
    Kenny Holston via Getty Images

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images

    Food supplier cyber risk spreads 1 year after JBS attack

    Ransomware attacks target common vulnerabilities like legacy OT systems and equipment that lacks modern security tools.

    By June 2, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images

    Conti ransomware gang grows brash and flames out. What's next?

    The group's reported demise is likely a diversion. Members of the group still pose a significant ransom and data extortion threat to enterprises.

    By May 31, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • Image attribution tooltip
    Sean Rayford / Stringer via Getty Images

    How the Colonial Pipeline attack instilled urgency in cybersecurity

    The federal government and private sector are still coming to terms with how to protect operational technology in an increasingly volatile threat environment.

    By May 17, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images

    US, allies blame Russia for Viasat cyberattack

    The Five Eyes and other EU authorities linked Russia to a series of web defacement, DDoS and destructive wiper attacks in the weeks leading up to the Ukraine invasion.

    By May 11, 2022