Cyberattacks: Page 27


  • Woman Walking On Staircase Of Building
    Image attribution tooltip
    Ceres Van Hal / EyeEm via Getty Images
    Image attribution tooltip
    Sponsored by Delinea

    How does Privileged Access Management work?

    The model is a framework to help you set the right PAM foundation and get your organization on the PAM journey, now and in the future.

    Aug. 29, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Tips for how to safeguard against third-party attacks

    Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk. 

    By Aug. 25, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    Ransomware attack surges tied to crypto spikes

    Not every ransomware attempt leads to a successful attack. But with more attempts comes more potential damage.

    By Aug. 24, 2022
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Credential stuffing hammers US businesses as account data for sale in bulk

    Media companies, retailers, restaurant groups and food delivery services are at heightened risk, the FBI said.

    By Aug. 23, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Third-party attacks spike as attackers target software connections

    Every third-party tool and partnership is a potential path for attack and an opportunity to exploit human behavior. The risks spread far and wide.

    By Aug. 22, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    LockBit ransomware group claims responsibility for Entrust attack

    The prolific ransomware gang threatened to publish data stolen during the attack.

    By Aug. 19, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By Aug. 18, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Twilio phishing attack fallout spreads to Signal

    The vendor’s widely used two-factor authentication service became a point of potential compromise for 1,900 Signal users. One user suffered a direct hit.

    By Aug. 15, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    How attackers are breaking into organizations

    Threat actors lean heavily on phishing attacks, vulnerabilities in software and containers, and stolen credentials, according to top cyber vendor research.

    By Aug. 15, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Internal Cisco data stolen after employee hit by voice phishing attack

    Cisco identified the attacker as an initial access broker with ties to multiple cybercrime and ransomware groups.

    By Aug. 11, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip

    Cloudflare

    Image attribution tooltip

    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • A sample phishing text message provided by Twilio.
    Image attribution tooltip

    Twilio

    Image attribution tooltip

    Twilio employees duped by text message phishing attack

    The communications provider declined to say how many employees were duped and the amount of customers compromised.

    By Aug. 8, 2022
  • Gas pipeline with multiple valves.
    Image attribution tooltip
    insagostudio via Getty Images
    Image attribution tooltip

    Encevo stays resilient post-attack, but it’s still assessing the data damage

    The Luxembourg energy supplier’s ability to thwart a shutdown likely empowered its refusal to pay a ransom.

    By Aug. 8, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    WhataWin via Getty Images
    Image attribution tooltip

    The 11 most-prevalent malware strains of 2021 fuel cybercrime

    Cybercriminals remain the most prolific users of malware, wielding these top strains to deliver ransomware and steal data.

    By Aug. 5, 2022
  • Photograph of pipeline construction project.
    Image attribution tooltip
    JZ Hunt via Getty Images
    Image attribution tooltip

    Luxembourg energy supplier Encevo hit by ransomware attack

    The group behind the attack threatened to leak more than 150 gigabytes of sensitive data on Monday.

    By Aug. 1, 2022
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Most cyberattacks come from ransomware, email compromise

    Attackers are scanning for vulnerabilities in unpatched systems within 15 minutes, stressing the pace and scale of the threat.

    By Aug. 1, 2022
  • Digital background with an unopened keylock
    Image attribution tooltip
    MF3d/E+ via Getty Images
    Image attribution tooltip
    Sponsored by Delinea

    Benefits of modern PAM: Efficiency, security, compliance

    Cloud-ready Privileged Access Management (PAM) is vital to your cyber defense strategy.

    By Shweta Khare, Cybersecurity Evangelist, Delinea • Aug. 1, 2022
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Entrust acknowledges June cyberattack, remains tight-lipped on the details

    The cybersecurity vendor has yet to disclose how the incident occurred, the type of data stolen and if ransomware was involved.

    By July 28, 2022
  • The T-Mobile logo is displayed outside of a T-Mobile store on April 24, 2017 in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    T-Mobile agrees to $500M settlement for 2021 cyberattack

    The wireless carrier suffered a massive data breach in the summer of 2021, the fifth publicly acknowledged incident of its type in three years.

    By July 25, 2022
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    LockBit ransomware hitting network servers

    The latest tactic used to deploy the prolific malware allows threat actors to end processes, stop services and duplicate more quickly.

    By July 20, 2022
  • Florida International University campus
    Image attribution tooltip
    Permission granted by Florida International University
    Image attribution tooltip

    Ransomware attacks surge in education sector

    Colleges and universities are particularly challenged as repercussions of ransomware hit them harder and longer than other organizations.

    By July 14, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Threat actors favor brute force attacks to hit cloud services

    Google Cloud warned that organizations face their greatest threat due to weak passwords and vulnerable software.

    By July 12, 2022
  • A rendering of an empty hospital corridor with a reception desk.
    Image attribution tooltip
    Ninoon via Getty Images
    Image attribution tooltip

    Hospital ransomware concerns rise after payment vendor breach, North Korea threats

    A recently disclosed ransomware attack could have exposed patient data from more than 650 healthcare providers.

    By Rebecca Pifer • July 11, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Pricing pressures moderate as cyber insurance market begins to level out

    A surge in new buyers has begun to offset years of rising claims and higher premiums, according to data from global insurance firm Marsh.

    By Naomi Eide • July 1, 2022