Cyberattacks: Page 3


  • A sign at Lurie Children's Hospital
    Image attribution tooltip
    Jeff Schear/Getty Images for Ann and Robert H. Lurie Hospital of Chicago via Getty Images
    Image attribution tooltip

    Chicago children’s hospital confirms cyberattack, continues to provide care

    Lurie Children’s Hospital took its computer systems offline more than a week ago.

    By Emily Olsen • Updated Feb. 9, 2024
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Ransomware actors hit zero-day exploits hard in 2023

    Ransomware payments surpassed $1.1 billion and researchers say attack sprees targeting MOVEit, GoAnywhere, Citrix devices and PaperCut helped fuel the surge.

    By Feb. 8, 2024
  • A wall of binary code is partly unzippered, revealing the face of Ben Franklin as seen on the $100 bill. Explore the Trendline
    Image attribution tooltip
    imagedepotpro via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    AnyDesk attack response stirs threat analyst criticism and doubts

    The company said session hijacking is "extremely unlikely" and credential compromise is a "theoretical risk," but a possibility it cannot rule out.

    By Feb. 7, 2024
  • Image attribution tooltip
    (Justin Sullivan/Getty Images) via Getty Images
    Image attribution tooltip

    Clorox says it incurred $49M in costs from 2023 cyberattack

    The breach caused system disruptions that led to order processing delays and “significant product outages,” negatively impacting net sales and earnings.

    By Alexei Alexis • Feb. 7, 2024
  • Coin stack on international banknotes with house model on table.
    Image attribution tooltip
    Zephyr18 via Getty Images
    Image attribution tooltip

    Mortgage industry attack spree punctuates common errors

    Attacks against Mr. Cooper Group, Fidelity National Financial, First American Financial and loanDepot impacted operations and put customers in a bind.

    By Feb. 6, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ivanti VPNs face renewed threat activity after initial patch release and new CVEs

    After weeks of mitigation efforts, CISA ordered federal civilian agencies to disconnect the devices.

    By Feb. 6, 2024
  • A group of workers at an office desk.
    Image attribution tooltip
    Skynesher via Getty Images
    Image attribution tooltip

    AnyDesk initiates extensive credentials reset following cyberattack

    The widely used remote access tool revoked all passwords to its web portal as researchers warn about potential theft of AnyDesk’s code signing certificate.

    By Feb. 5, 2024
  • Cloudflare's global network
    Image attribution tooltip
    Courtesy of Cloudflare
    Image attribution tooltip

    Cloudflare hit by follow-on attack from previous Okta breach

    A threat actor that previously intruded Cloudflare’s network through its Okta environment regained access with mistakenly unrotated credentials.

    By Feb. 2, 2024
  • Johnson Controls logo above a production plant in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Johnson Controls reports $27M hit from ransomware attack

    The industrial controls conglomerate said a threat actor stole data and deployed ransomware on its internal IT infrastructure.

    By Jan. 31, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    MOVEit liabilities mount for Progress Software

    The company revealed multiple government investigations are underway into the MOVEit vulnerability. It’s also party to more than 100 class-action lawsuits.

    By Jan. 30, 2024
  • Schneider Electric hit by ransomware attack against its sustainability business division

    Cactus ransomware reportedly claimed credit for the mid-January attack, and the company unit hopes to restore operations in the next couple of days.

    By Jan. 30, 2024
  • Microsoft's visitor center at its Redmond campus.
    Image attribution tooltip
    Stephen Brashear via Getty Images
    Image attribution tooltip

    Midnight Blizzard attack seen as another sign of Microsoft falling short on security

    Critics say the hack of senior Microsoft executives’ emails is another example of a longstanding series of security lapses and foot-dragging by the company.

    By Jan. 26, 2024
  • Front of Hewlett Packard Enterprise's campus in Houston.
    Image attribution tooltip
    Courtesy of HPE
    Image attribution tooltip

    HPE hit by a monthslong cyberattack on its cloud-based email

    The attack by Midnight Blizzard, the group that recently hit Microsoft, stole emails and data from HPE employees in cybersecurity and other business units.

    By Jan. 25, 2024
  • An illustration of a stock market graph and bar chart price display.
    Image attribution tooltip
    maciek905 via Getty Images
    Image attribution tooltip

    Trading platform EquiLend down following cyberattack

    The prolific criminal group LockBit has reportedly claimed credit for the attack, raising further questions about the risks facing the securities and banking industries.

    By Jan. 25, 2024
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    US data compromises surged to record high in 2023

    Breached organizations are withholding critical information more often than ever, underscoring a trend toward opaque notices, the Identity Theft Resource Center said.

    By Jan. 25, 2024
  • A closeup of a white "Vans" sign, below a red-trimmed window, reflecting a blue-gray sky.
    Image attribution tooltip
    Daphne Howland/Cybersecurity Dive
    Image attribution tooltip

    VF Corp. cyberattack impacted 35.5M consumers

    The North Face and Vans parent company originally reported the incident at the height of the holiday season.

    By Kaarin Vembar • Jan. 23, 2024
  • Microsoft CEO Satya Nadella addresses shareholders during Microsoft Shareholders Meeting December 3, 2014 in Bellevue, Washington.
    Image attribution tooltip
    Stephen Brashear / Stringer via Getty Images
    Image attribution tooltip

    Microsoft to overhaul internal security practices after Midnight Blizzard attack

    After Microsoft disclosed a state-sponsored actor stole data from senior executives, experts are raising questions about its security capabilities and practices.

    By Jan. 22, 2024
  • Purchase agreement with model home
    Image attribution tooltip
    guvendemir via Getty Images
    Image attribution tooltip

    LoanDepot ransomware attack exposes data on almost 17M customers

    The number of individuals impacted makes it the most widespread compromise of customer data in the spree of attacks targeting the real estate sector.

    By Jan. 22, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure exploitation accelerates as Moody’s calls impact credit negative

    A suspected state-linked hacker is manipulating an integrity tool used to check systems as customers still await an initial patch.

    By Jan. 19, 2024
  • Interior of Progress Software's office in Rotterdam, Netherlands.
    Image attribution tooltip
    Retrieved from Progress Software on January 18, 2024
    Image attribution tooltip

    Progress Software shakes off MOVEit’s financial consequences, maintains customers

    Executives described the file-transfer service as one of its stronger performing products and said customers remain loyal.

    By Jan. 18, 2024
  • An image of a digital lock is shown
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ivanti Connect Secure exploitation accelerates, 1,700 devices compromised worldwide

    Researchers warn additional threat actors are actively working to take advantage of two chained together vulnerabilities.

    By Jan. 17, 2024
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Wealthy countries boast superior cyber defenses

    A nation’s economic prosperity is directly linked to greater defense capabilities, but no country is overachieving in cyber defense, according to SecurityScorecard.

    By Jan. 17, 2024
  • Aerial view of Colorado State University campus.
    Image attribution tooltip
    Retrieved from Colorado State University on January 09, 2024
    Image attribution tooltip
    Deep Dive

    Progress Software’s MOVEit meltdown: uncovering the fallout

    Businesses use the file-transfer service because it checks the compliance boxes for keeping data safe. Though initial attacks were targeted, thousands of bystanding businesses were hit indiscriminately.

    By , Jan. 16, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Elevated ransomware activity hit nearly 5,200 organizations in 2023

    While ransomware activity remains high, the number of unique ransomware families used for these attacks decreased by more than half, Rapid7 researchers found.

    By Jan. 12, 2024
  • Header image for "43% of Audit Executives Rank Cybersecurity Controls as 2023's Lead Risk"
    Image attribution tooltip
    Colin Anderson Productions pty ltd
    Image attribution tooltip

    Ivanti Connect Secure attacks part of deliberate espionage operation

    Researchers warn the previously unknown actor has developed custom malware designed to maintain persistent access on targeted networks and evade detection.

    By Jan. 12, 2024